期刊文献+

基于逻辑程序的访问控制描述与推理 被引量:1

Description and Reasoning of Access Control Based on Logical Program
下载PDF
导出
摘要 提出访问控制的逻辑描述方法,满足最小模型语义的条件(不含负逻辑),并分析访问控制逻辑程序中不动点的迭代计算方法。通过迭代计算,得到访问控制逻辑程序的最小Herbrand模型——Mp。使用基于逻辑程序的方法对访问控制策略进行了较为精确的推理。 This paper presents a logical means for expressing access control,which satisfies the condition of least model semantic that has no negative,and analyzes an iterative algorithm for calculating the fixpoint of the logic program corresponding to the access control.According to the iterative algorithm,it calculates the least Herbrand model of logic program corresponding to the access control.Access control strategy is reasoned,through logical program,which makes reasoning of access control effectively.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第8期77-79,共3页 Computer Engineering
关键词 逻辑程序 访问控制模型 不动点 最小模型语义 logical program access control model fixpoint least model semantic
  • 相关文献

参考文献7

  • 1Bai Yun, Zhang Yan, Varadharajan V. On the Sequence of Authorization Policy Transformations[J]. Int. J. Inf. Sec., 2005, 4(1/2): 120-131.
  • 2Sushil J, Pierangela S, Subrahmanian V S. A Logical Language for Expressing Authorizations[C]//Proc. of the 1997 /EEE Syrup. on Security and Privacy. [S. l.]: IEEE Computer Society Press, 1997: 31-42.
  • 3Bettini C, Jajodia S. Reasoning with Advanced Policy Rules and Its Application to Access Control[J]. Journal of Digital Libraries, 2004, 4(3): 156-170.
  • 4Wang Lingyu, Duminda W, Sushil J. A Logical-based Framework for Attribute Based Access Control[C]//Proc. of ACM Workshop on Formal Methods in Security Engineering. Washington D. C., USA:[s. n.], 2004: 45-55.
  • 5James B D. Joshi E B. A Generalized Temporal Role-Based Access Control Model[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(1 ): 4-23.
  • 6Melvin F. Fixpoint Semantics for LOgic Programming[J]. Theor. Comput. Sei., 2002, 278(1/2): 25-51
  • 7王怀民.逻辑程序的语义问题(Ⅱ)[J].计算机科学,1994,21(2):10-18. 被引量:1

同被引文献7

  • 1张利平,陈辉,张颖江.支持IP网络访问认证协议PANA的研究[J].计算机安全,2006(3):49-51. 被引量:2
  • 2Rigney C,Willens S,Rubens A,et al.Remote Authentication Dial in User Service[S].RFC 2865,2000.
  • 3Calhoun P,Loughney J,Guttman E,et al.Diameter Base Protocol[S].RFC 3588,2003.
  • 4Forsberg D,Ohba Y,Patil B,et al.Protocol for Carrying Authentication for Network Access[S].RFC 5191,2008.
  • 5Aboba B,Blunk L,Vollbrecht J,et al.Extensible Authentication Protocol[S].RFC 3748,2004.
  • 6Vollbrecht J,Eronen P,Petroni N,et al.State Machines for Extensible Authentication Protocol[S].RFC 4137,2005.
  • 7李娜,孙纪敏,高晓燕.AAA新技术Diameter协议的研究及实现[J].无线电工程,2008,38(7):4-7. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部