期刊文献+

多主体多方向的可管理使用控制模型研究 被引量:1

On an Administrative Usage Control Model for Multi-Subject and Multi-Direction Access Control
下载PDF
导出
摘要 在高度动态的分布式环境下,传统单方向的访问控制已经不能为系统提供足够的可信赖性。本文分析了多种主体之间的相互关系,针对隐私保护问题提出了可管理的使用控制模型。该模型能够解决多种主体之间的并行控制、系列控制和使用控制问题。本文还对实现AUCON的安全体系结构和相关的安全机制进行了细致的描述。分层的方法可以为解决问题提供一个完整而高效的安全解决方案。 In today's dynamic distributed digital environments, the traditional one-way control no longer provides adequate trustworthiness. We review three kinds of subjects and analyze their relationships. Based on the usage control model, we propose an administrative usage control model named AUCON to resolve the access control problem for parallel control, series control,and usage control. AUCON provides a formal model which can control the provider subject to issue tickets for consumer subjects and monitor the access of consumers to privacy-sensitive objects. The architecture section presents formal structural ways in which appropriate mechanisms can be implemented to achieve predefined security objectives. This layered approach provides a whole effective security solution to the privacy protection problerrL
出处 《计算机工程与科学》 CSCD 2008年第3期130-132,152,共4页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60403027) 湖北省自然科学基金资助项目(2005ABA243)
关键词 访问控制 多主体 管理模型 使用控制 access control multi-subjects administrative model UCON
  • 相关文献

参考文献8

  • 1Bell D, LaVadula L. Secure Computer Systems: Mathematical Foundations and Model. Version 2 [R]. Technical Report MTR 2547, MITRECorp, 1973.
  • 2Sandhu R, Coyne E, Feinstein H, et al. Role-Based Access Control Models[J]. IEEE Computer, 1996,29 (2) : 38-47.
  • 3Ferraiolo D F, Sandhu R, Gavrila S. Proposed NIST Standard for Role-Based Access Control[J]. ACM Trans on Information and System Security, 2001,4(3): 224-274.
  • 4Park J,Sandhu R The UCONABC Usage Control Model[J]. ACM Trans on Information and Systems Security,2004,7(1): 128-174.
  • 5Sandhu R,Park J. Usage Control:A Vision for Next Generation Access Control[C]//Proc of the 2nd Int'l Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003 : 17-31.
  • 6洪帆,崔永泉,崔国华,付才.多域安全互操作的可管理使用控制模型研究[J].计算机科学,2006,33(3):283-286. 被引量:7
  • 7ISO/IEC 10181-3, Security Frameworks for Open Systems: Access Control Framework[S]. 1996.
  • 8Draft Revised ITU-T Recommendation X. 509. ISO/IEC 959 4-8, Information Technology-Open Systems In The Directory: Public-Key and Attribute Certificate Frameworks[S]. 2000.

二级参考文献10

  • 1Park J,Zhang Xinwen,Sandhu R S.Attribute Mutability in Usage Control.In:Eighteenth Annual Conference on Data and Applications Security,Sitges,Catalonia,Spain,2004.15 ~ 29.
  • 2Kapadia A,Al-Muhtadi J,Campbell R,et al.IRBAC2000:Secure Interoperability Using Dynamic Role Translation.In:The 1st International Conference on Internet Computing,June 26th -29th,2000,Monte Carlo Resort,Las Vegas,Nevada,USA,2000.
  • 3Campbell R,Liu Z,Mickunas D,et al.Seraphism:Dynamic interoperable security architecture for active networks.IEEE OPENARCH 2000,Tel-Aviv,March 2000.
  • 4Freudenthal E,et al.dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments [EB/OL].http://www.cs.nyu.edu/vijayk/papers/drbac-icdcs02.pdf,2002-06.
  • 5Al-Muhtadi J,Kapadia A,Campbell R H,et al.A-IRBAC 2000Model:Administrative Interoperable Role-Based Access Control:[Technical Report].UIUC-DCSR-2000-2163.http://choices.cs.uiuc.edu/~almuhtad/.
  • 6Sandhu R S,Coyne E J,Feinstein H L,et al.Role-Based Access Control Models.IEEE Computer,1996,29(2):38~47.
  • 7Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 Modelfor Role-Based Administration of Roles.ACM Transactions on Information and System Security,1999,2(1):105~135.
  • 8Park J,Sandhu R.Towards usage control models:beyond traditional access control.In:Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies,ACM Press.57~64.
  • 9Sandhu R,Park J.Usage control:A vision for next generation access control.In:Proceedings of The 2nd International Workshop on Mathematical Methods,Models and Architectures for Computer Networks Security.17~31.
  • 10Park J,Sandhu R.The UCONABC Usage Control Model.ACM Transactions on Information and Systems Security,2004,7(1):128~174.

共引文献6

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部