期刊文献+

基于UCON模型的PMI体系结构 被引量:2

PMI architecture based on UCON model
下载PDF
导出
摘要 基于角色的访问控制(RBAC)是授权管理基础设施PMI常用的策略,但它不能有效地解决资源使用中授权访问控制等动态授权问题。作为一种新型的访问控制技术,使用控制UCON模型具有支持动态授权等优势。基于UCON提出了一种授权管理体系结构UCB-PMI,并用可扩展访问标记性语言XACML描述其授权策略,最后分析了UCB-PMI的特点。 The policy of privilege management infxastructure (PMI) is usually role-based access control (RBAC). However RBAC can not effectively solve dynamic authorization etc. As a new access control technique usage control (UCON) model has several predominance of holding out dynamic authorization. An architecture for dynamic authorization is proposed based on UCON model. The authorization policy of the architecture is described by XACML. At last, the characteristic of the architecture is analyzed.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第7期1590-1592,1610,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2006AA01Z457)
关键词 使用控制 授权管理基础设施 动态授权 可扩展访问标记性语言 访问控制策略 UCON PMI dynamic authorization XACML access controlpolicy
  • 相关文献

参考文献8

二级参考文献21

  • 1袁平鹏,陈刚,董金祥.多政策的两层协同应用存取控制模型[J].计算机辅助设计与图形学学报,2004,16(4):420-426. 被引量:19
  • 2SANDHU RS,COYNE EJ,FEINSTEIN HL,et al.Role-based access control models[J]. IEEE Computer,1996,29(2):38-47.
  • 3MCPHERSON D,Microsoft Corporation.Role-Based Access Control for Multi-tier Applications Using Authorization Manager[EB/OL].http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/management/athmanwp.mspx,2004-07.
  • 4Gail-Joon Alan, Ravi Sandhu. Injecting RBAC to seaure a webbased workflow system[C], New York: Proceedings of the fifth ACM workshop on role-based access control, ACM press, 2000.
  • 5Henry Xie.J2EE实例详解【M】.北京:人民邮电出版社,2003.
  • 6OASIS. Extensible access control markup language committee draft 04[S].2004-12,
  • 7I Foster,C Kesselman,S Tuecke.The anatomy of the grid:Enabling scalable virtual organizations[J].International Journal of High Performance Computing Applications,2001,15(3):200-222
  • 8余诗鹏.基于角色访问控制的理论与应用研究:[硕士论文][D].北京:北京大学,2003.
  • 9D E Bell,L J Lapadula.Secure computer systems:Mathematical foundations[R].MITRE,Tech Rep:MTR-2547,1973
  • 10K J Biba.Integrity considerations for secure computer systems[R].MITRE,Tech Rep:TR-3153,1977

共引文献49

同被引文献16

  • 1芮国荣,邢桂芬.基于角色和规则的访问控制[J].计算机应用,2005,25(4):864-866. 被引量:15
  • 2陈颖,杨寿保,郭磊涛,申凯.网格环境下的一种动态跨域访问控制策略[J].计算机研究与发展,2006,43(11):1863-1869. 被引量:21
  • 3Kapadia A, Muhtadi J A, Campbell R H, et al. IRBAC 2000: secure interoperability using dynamic Role translation[R]. Technical Report UIUCDCSR-2000-2162. [S. l. ]: University of Illinois, 2000.
  • 4Russello G, Dulay N. xDUCON: cross domain usage control through shared data spaces [C] // Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. Washington,DC, USA: IEEE Computer Society, 2009: 178-181.
  • 5Park J, Sandhu R. Towards traditional access control [C] usage control models: Beyond //Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64.
  • 6Zhang X W, Park J, Sandhu R, et al. A logical specification for usage control [C] //Proceedings of the 9th ACM Symposi- um on Access Control Models and Technologies. New York: ACM, 2004: 1-10.
  • 7Salim F, Reid J, Dawson E. An administrative model for UCONABc [C] //Proceedings of the 8th Australasian Confe- rence on Information Security. Darlinghurst: Australian Com- puter Society, 2010: 32-38.
  • 8Zhang X W, Sandhu R, Presicce F P. Safety analysis of usage control authorization models [C] //Proceedings of the ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 243-254.
  • 9Rajkumar P V, Ghosh S K, Dasgupta P. An end to end correct- ness verification approach for application specific usage control [C] //Proceedings of the International Conference on Industrial and Information Systens Washington: IEEE, 2009: 1-6.
  • 10Fang Zhihe, He Hongiun, Luo Li, et al. Application of UCON in SSL VPN system [C] //Proceedings of the Intema tional Conference on Progress in lnformatics and Computing. Washington: IEEE, 2010: 618-621.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部