期刊文献+

基于动态描述逻辑的UCON授权模型 被引量:4

Authorization Model of UCON Based on Dynamic Description Logic
下载PDF
导出
摘要 使用控制(UCON)是下一代访问控制模型,其核心模型包括授权模型、义务模型和条件模型。该文的目的是使用动态描述逻辑DDL对UCON授权模型进行逻辑表述,对授权过程中的各个决定要素进行逻辑描述并提供可判定性推理,提出UCON授权模型的逻辑模型,并提供了一个完整的授权实例,为模型的实际应用奠定一个较好的逻辑基础。 The concept of Usage Control(UCON) is introduced as a unified approach. The UCON model includes authorization model, obligation model and condition model. Dynamic description logic is proposed for authorization model, by combining the features of reasoning and capturing factors of authorization. An integrated authorization instance is provided. This logical model provides a fine foundation for application of UCON.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第19期163-166,共4页 Computer Engineering
关键词 使用控制 授权模型 动态描述逻辑 逻辑模型 Usage Control(UCON) authorization model dynamic description logic logical model
  • 相关文献

参考文献5

  • 1Park J, Sandhu R. A Unified Framework For Next Generation Access Control[D]. Fairfax County, USA: George Mason University, 2006.
  • 2Zhang Xinwen, Sandhu R, Park J, et al. Formal Model and Policy Specification of Usage Control[J]. ACM Trans. on Information and SYStem Security, 2005, 8(4): 351-387.
  • 3Park J. The UCONABC Usage Control Model[J]. ACM Trans. on Information and System Security, 2004, 7(1): 1-47.
  • 4Park J, Sandhu R. Towards Usage Control Models Beyond Traditional Access Control[C]//Proc. of the 7th ACM Symposium on Access Control Models and Technologies. [S. l.]: ACM Press, 2002.
  • 5史忠植,董明楷,蒋运承,张海俊.语义Web的逻辑基础[J].中国科学(E辑),2004,34(10):1123-1138. 被引量:71

二级参考文献15

  • 1Berners-Lee T, Hendler J, Lassila O. The semanticWeb. Scientific American, 2001, 284(5): 34-43
  • 2http://www.w3.org/TR/daml+oil-reference
  • 3http://www.w3.org/TR/owl-ref/
  • 4Horrocks I. DAML+OIL: A description logic for the semantic web. Bull of the IEEE Computer Society Technical Committee on Data Engineering, 2002, 25(1): 4-9
  • 5Horrocks I, Peter F. Patel-Schneider. Reducing OWL entailment to description logic satisfiability. In: Fensel D, Sycara D, Mylopoulos D, ed. Proc of the 2003 International Semantic Web Conference (ISWC 2003), Berlin: Springer, 2003. 17~29
  • 6Baader F, Horrocks I, Sattler U. Description logics as ontology languages for the semantic web. In: Dieter Hutter and Werner Stephan, ed. Festschrift in honor of J?rg Siekmann, Berlin: Springer, 2003
  • 7McIlraith S, Son T C, Zeng H. Semantic web services. IEEE Intelligent Systems, Special Issue on the Semantic Web, 2001, 16(2): 46-53
  • 8Baader F, et al. The Description Logic Handbook: Theory, Implementation and Applications. Cambridge: Cambridge University Press, 2002
  • 9Lutz C, Sattler U. A Proposal for Describing Services with DLs. In: Horrocks, Tessaris S, ed. Proceedings of the 2002 International Workshop on Description Logics, Aachen : CEUR-WS, 2002. 129-140
  • 10Wolter F, Zakharyaschev M. Dynamic description logic. In Segerberg K, et al, ed. Advances in Modal Logic, Vol 2. Stanford: CSLI Publications, 2000. 449-463

共引文献70

同被引文献24

  • 1郑然,金海,章勤.网格工作流资源层次模型与访问机制[J].华中科技大学学报(自然科学版),2006,34(z1):37-40. 被引量:5
  • 2芮国荣,邢桂芬.基于角色和规则的访问控制[J].计算机应用,2005,25(4):864-866. 被引量:15
  • 3陈颖,杨寿保,郭磊涛,申凯.网格环境下的一种动态跨域访问控制策略[J].计算机研究与发展,2006,43(11):1863-1869. 被引量:21
  • 4Kapadia A, Muhtadi J A, Campbell R H, et al. IRBAC 2000: secure interoperability using dynamic Role translation[R]. Technical Report UIUCDCSR-2000-2162. [S. l. ]: University of Illinois, 2000.
  • 5Russello G, Dulay N. xDUCON: cross domain usage control through shared data spaces [C] // Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. Washington,DC, USA: IEEE Computer Society, 2009: 178-181.
  • 6PADAYACHEEA K,ELOFF J H P.Adapting usage control as a deterrent to address the inadequacies of access controls[J].Computers & Security,2009,28(7):536-544.
  • 7Park J, Sandhu R. Towards usage control models: beyond traditional access control[C]//proc of the 71h ACM Symposium on Access Contrnl Models and Tcehnologies. California: ACM Press, 2002: 57-64.
  • 8Park J, Sandhu R. The UCONADC usage control model[J]. ACM Trans on Information and System Security, 2004, 7(1): 128-174.
  • 9Zhau Baoxian, Ravi Sandhu, Zhang Xinwen, et al. Toward: a times-based usage control model[J]. DBSee, 2007: 227-242.
  • 10Yang Ran, I,in Chuang, Feng FuJian. A time and mutahle, attribute-based access control model[J]. Journal of Computers, 2009, 6(4). 510-518.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部