期刊文献+

基于PKI的用户委托RBAC

原文传递
导出
摘要 PKI技术能够有效的保证网络通信的安全,基于角色的访问控制是一种先进的访问控制模式,能有效的降低大型企业访问控制的复杂性。本文提出了一种将PKI技术和RBAC相结合的用户委托RBAC的方法。
作者 龚坚
出处 《网络安全技术与应用》 2009年第6期18-20,共3页 Network Security Technology & Application
  • 相关文献

参考文献2

二级参考文献22

  • 1R Sandhu, V Bhamidipati, O Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans on Information and System Security, 1999, 2( 1 ) : 105--135.
  • 2J Luciani. Server cache synchronization protocol (SCSP). RFC2334, 1998.
  • 3D Wessles, K Claffy. Application of Internet cache protocol(ICP), version 2. RFC 2187, 1997.
  • 4D Wessles, K Claffy. Internet cache protocol(ICP), version 2.RFC 2186, 1997.
  • 5D Wessles, K Claffy. ICP and the squid Web cache. National Laboratory for Applied Network Research. 1997. http://www. nlanr, net/-- wessels/Papers /icp-squid. ps. gz.
  • 6D Wessels. The squid intemet object cache. National Laboratory for Applied Network Research. 1997. http.//squid. nlanr.net/Squid/
  • 7EnCommerce. getAccess. 2001. http://www. encommerce.com/products.
  • 8R Sandhu, E Coyne, H Feinstein et al. Role-based access control model. IEEE Computer, 1995, 29(1): 38--47.
  • 9J Park, R Sandhu, G Ahn. Role-based access control on the Web.ACM Trans on Information and System Security, 2000, 4( 1 ) : 37--71.
  • 10C Ramaswamy, R Sandhu. Role-based access control features in commercial database management systems. In: Proc of the 21st National Information Systems Security Conf. CA: ACM Press,1998.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部