期刊文献+

基于多元判决的动态访问控制架构的研究 被引量:3

Research of General Dynamic Access Control Architecture Based on Multi-Decision
原文传递
导出
摘要 论文在分析现有访问控制模型和技术的基础上,结合多元判决与动态访问控制的思想,提出了一种基于多元判决的动态通用访问控制架构,并重点阐述了多元判决与动态授权管理的设计思路,对架构中各模块、数据库进行了介绍。本体系架构克服了现有访问控制技术中判决依据单一、授权方式无法满足部分应用业务安全需求的不足,为访问控制实现提供了新的思路。 Based on analyzing current models and technologies in access control domain, it is found that most of the access control systems in use implement authorization only by user identity. When the network environment turns into insecurity, the system is unable to change its policy to handle such situation by itself. So in this paper, a new architecture of access control is proposed, which determines customers' privileges by multi-decision and dynamic management. A detailed design of multi-decision and dynamic management pattern is given and then the description of key modules and database is followed. This architecture provides a solution to the problem mentioned above and new thoughts in access control.
出处 《信息安全与通信保密》 2009年第4期44-46,49,共4页 Information Security and Communications Privacy
关键词 访问控制 多元 动态 LDAP access control multi-decision dynamic control LDAP
  • 相关文献

参考文献5

  • 1Ravi Sandhu,David Ferraiolo,Richard Kuhn.American National Standard for Information Technology-Role Based Access Control[S].ANSI INCITS 359-2004,US:American National Standards Institute,Inc,2004:02-14.
  • 2D.F.Ferraiolo.Role-Based Access Control,Computer Security Series[EB/OL].D.R.Kuhn,R.Chandramouli.Version 1.US:Artech House,2003:69-88[Sep 2008].http://csrc.nist.gov/groups/ SNS/rbac/documents/rbac-book.html.
  • 3Richard Fernandez.Enterprise Dynamic Access Control(EDAC) Compliance with the Role-Based Access Control(RBAC) Standard ANSI/INCITS 359-2004[EB/OL].US National Institute of Standards and Technology(NIST),May 2005[Sep 2008].http://csrc.nist.gov/groups/SNS/rbac/documents/standards/EDA Ccompliance.pdf.
  • 4Richard Fernandez.Enterprise Dynamic Access Control (EDAC).Version 2[EB/OL].US:National Institute of Standards and Technology(NIST),Jan,2006[Sep 2008].http://csrc.nist.gov/groups/SNS/rbac/documents/standards/EDACv2overview.pdf.
  • 5Scott Kelly,Amit Agarwal.TCG Trusted Network Connect TNC Architecture for InteroperabilitySpecification Version 1.3 Revision 6[R].US:Trusted Computing Group,Inc.April 2008 (TCG).

同被引文献18

  • 1Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(02):38-47.
  • 2Al-Kahtani M,Sandhu R S.A Model for Attribute-Based User-Role Assignment[C]//Proceed-ings of the 18th Annual Computer Security Applications Conference,[s.l.]:IEEE,2002:353-362.
  • 3Park J,Sandhu R.The UCONABC Usage Control Model[J].ACM Trans,on Information and System Security,2004,07(01):128-174.
  • 4Al-Kahtani M,Sandhu R S.Rule-Based RBAC with Negative Authorization[C]//Proceedings of the 20th Annual Computer Security Applications Conference,[s.l.]:IEEE,2004:405-415.
  • 5SANDHU R, COYNE E J, FEINSTEIN H L, et al. Role Based Access Control Models[J]. IEEE Computer, 1996, 29(02): 38-47.
  • 6BYUN J, LI N H. Purpose based Access Control for Privacy Protection in RelationalDatabase Systems[J]. The VLDB Journal, 2008, 17(04): 603-619.
  • 7CRANOR L F, LANGHEINRICH M, MARCHIORI M. The Platform for Privacy Preferences 1.0(P3P1.0) Speeification[EB/ OL]. (2002-04-16). http: //www.w3.org/TR/P3P/.
  • 8HECKER M, DILLON T. Privacy Support and Evaluation on an Ontological Basis[C]//Data Engineering Workshop. IEEE 23rd International Conference.Istanbul: Data Engineering Workshop, 2007: 221-227.
  • 9HECKER M, DILLON T S, CHANG E. Privacy Ontology Support for E-Commerce[J]. Internet Computing, 2008, 12(02) : 54-61.
  • 10QUN N, TROMBETTA A, ERTINO E, et al. Privacy-Aware Role Based Access Control[J]. Security & Privacy, 2009, 07(04): 35-43.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部