期刊文献+

扩散数据管理中访问控制的研究

Research on Access Control in Data Management of Proliferation Manufacturing
下载PDF
导出
摘要 首先介绍了基于使用控制的访问控制技术,然后引入角色、时限和安全级,建立了一个简化的使用控制模型,并给出了模型的形式化描述,同时以扩散制造为背景,具体阐述了基于角色和时限的使用控制模型的应用过程,最后以具体实例对所提方法进行了验证。 It introduces the usage control, establishes a simplified usage control model with attributes of role, time range and security level. It presents the model in a formal description, discusses the application of role and time rage based usage control model in proliferation manufacturing, shows a case of the model.
作者 宋燕 闫崇京
出处 《中国制造业信息化(学术版)》 2009年第8期18-21,共4页
基金 江苏省制造业信息化公共技术服务平台建设基金资助项目(BM2007102)
关键词 使用控制 访问控制 数据管理 扩散制造 Usage Control Access Control Data Management Proliferation Manufacturing
  • 相关文献

参考文献8

  • 1Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, et al. Role- based access control models[J]. IEEE Computer, 1996,29(2) : 38 - 47.
  • 2卢亚辉,张力,刘英博.基于域的综合访问控制模型[J].计算机集成制造系统,2006,12(12):1978-1985. 被引量:6
  • 3Ravi Sandhu, Jaehong Park. Usage control: a vision for next generation access control[ A]. Proceedings of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security [ C]. Heidelberg: Springer Berlin, 2003 : 17 - 31.
  • 4郑小林,雷宇,陈德人.面向网络化制造系统的用户访问控制研究[J].浙江大学学报(工学版),2005,39(11):1735-1739. 被引量:6
  • 5尹建伟,徐争前,冯志林,陈刚,董金祥.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1):143-149. 被引量:16
  • 6CHEN Tsungyi, CHEN Yuhmin,CHU Huichuan, et al. Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise[J ]. Computers in Industry, 2007, 58(1): 57-58.
  • 7EL Gutierrez Vela,J L Isla Montes, P Padenrewski Rodriguez, et al. An architecture for access control management in collaborative enterprise systems based on organization models[J]. Science of Computer Programming, 2007, 66(1) :44 - 59.
  • 8刘清华,熊体凡,万立,陈立平.产品生命周期管理的访问控制模型研究[J].计算机辅助设计与图形学学报,2005,17(9):2116-2122. 被引量:4

二级参考文献28

  • 1卢亚辉,耿坤瑛.PDM/PLM系统授权模型的研究和应用[J].CAD/CAM与制造业信息化,2005(4):34-36. 被引量:7
  • 2Sejong Oh, Seong Park. Task-role-based access control model[J]. Information Systems, 2003, 28(6): 533~562.
  • 3Pfleger C P. Security in Computing[M]. 2nd Ed. Englewood Cliffs, NJ: Prentice-Hall International Inc., 1997.
  • 4Russel D, Gangemi Sr G T. Computer Security Basics[M]. Sebastopol, California: O'Reilly & Associates, 1991.
  • 5James B D. Joshi, Walid G. Aref, Arif Ghafoor, et al. Security models for web-based applications[J]. Communications of the ACM, 2001, 44(2): 38~44.
  • 6Amoroso E G. Fundamental of Computer Security Technology[M]. Englewoods Cliffs, NJ: Prentice-Hall, 1994.
  • 7Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control method[J]. IEEE Computer, 1996, 29(2): 38~47.
  • 8Ferraio D, Cugini J, Kuhn R. Role-based access control(RBAC): features and motivations[A]. In: Proceedings of the 11th Annual Computer Security Application Conference, New Orleans, 1995. 12~20.
  • 9Gaby Herrmann, Guenther Pernul. Towards security semantics in workflow management[A]. In: Proceedings of the 31th Annual Hawaii International Conference on System Sciences, Hawaii, 1998, 7: 766~772.
  • 10SANDHU R S, EDWARD J C, HAL L F, et al. Rolebased access control models [J]. IEEE Computer, 1996,29(2): 38- 47.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部