期刊文献+

一种基于格的访问控制模型

A lattice-based access control model
下载PDF
导出
摘要 描述了一种新型的访问控制模型,用格的结点表示与访问对象相关的访问权限,访问权限的变化映射在格上成为一个结点到另一个结点的变换.在模型中,实现了访问控制策略实时更新,加强了并发控制环境中系统的安全性.为保证访问控制策略更新的合法性,建立了访问权限与授权级别相结合的复合格,可按权限级别进行访问权限控制.在并发环境中,多个主体读写数据和修改访问控制策略并互相影响时,可直接应用文中的模型与算法. A new access control model is described. All possible access control privileges pertaining to an object can be represented as the nodes on the access control lattice of the object. The update of access control policy changes the mapping of the subject access privilege from one node to another in the access control lattice of object. The access control policy of real-time update is given in the model so that the system security is strengthened in a concurrent environment. In order to guarantee legitimacy of access control policy update, the compound lattice of an operation right lattice and an authorization level lattice are built. Access privilege can be controlled by authorization. The model and algorithms are useful for concurrent environment in which multiple subjects access and modify the access control policies.
出处 《江苏大学学报(自然科学版)》 EI CAS 北大核心 2008年第2期151-154,共4页 Journal of Jiangsu University:Natural Science Edition
基金 国家"863"计划资助项目(2002AA001020)
关键词 信息安全 访问控制 实时更新 事务 锁模型 information security access control lattice real-time update transaction lock model
  • 相关文献

参考文献6

  • 1Bertino E,Sandhu R S. Database security-concepts, approaches and challenges[ J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2( 1 ) : 2 - 19.
  • 2Sandhu R S,Samarati P. Access control: principle and practice [J]. IEEE Communications Magazine, 1994, 32(9) :40 -48.
  • 3Sandhu R S. Lattlce-based access control models [ J ].IEEE Computer, 1993, 26( 11 ) : 9 - 19.
  • 4Bertiono E, Buccafurri F, Ferrari E, et al. A logical framework for reasoning on data access control policies [ C ]//In Proceedings of the 12th IEEE Computer Security Foundations Workshop. Italy : Mordano, 1999 : 175 - 189.
  • 5Xin T,Ray I. A lattic-based approach for updating access control policies in real-time [J]. Information Systems, 2006, 14:1 -18.
  • 6陈继明,宋顺林.根据任务和角色进行Web访问控制[J].江苏大学学报(自然科学版),2003,24(4):57-60. 被引量:1

二级参考文献7

  • 1Rohit K. Web Security: A Matter of Trust[R]. Sebastopoi: O'Reilly & Associates, Inc. USA, 1997.
  • 2Ferraiolo D F, Barkley J F, Kulm D R. A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet [ J ] . ACM Transactions of Information and System Security, 1999, 2 ( 1 ) : 34 -64.
  • 3Sandhu R , Conyne E J , Lfeinstein H , Youman C E .Role Based Access Control Models[J ]. IEEE Computer,1996,29(2) :38 - 47.
  • 4Park Joon S, Sandhu R, Ahn Gail-Joon. Role-Based Access Control on the Web[J ]. ACM Transactions on Information and System Security, 2001, 4 ( 1 ) : 67 - 72.
  • 5Kristol D, Montulli L. Http State Management Mechanism[R]. RFC 2965, Network Working Group, Internet Engineering Task Force,2000.
  • 6孙健.Domino/Notes安全机制及网状安全设计研究[J].江苏理工大学学报(自然科学版),2001,22(3):71-74. 被引量:4
  • 7邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部