期刊文献+

基于使用控制模型的防恶意下载系统 被引量:5

Anti-Malicious Download System Based on UCON
下载PDF
导出
摘要 为了对恶意下载行为实施有效控制,研究通用访问控制框架和使用控制模型(UCON),提出基于流量的UCON。设计并实现基于UCON的防恶意下载系统,阐述其关键技术和实现方法。实验结果表明,该模型能有效控制用户下载行为,具有高安全性和较强的操作灵活性。 In order to control the malicious download behavior effectively, this paper studies the Generalized Framework for Access Control(GFAC), Usage CONtrol model(UCON), and presents UCON based on flow. It designs and implements the anti-malicious download system based on UCON, expatiates its key technologies and implementation method. Experimental results show that the model can control the user's download behavior effectively while has high security and running agility.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第23期149-151,共3页 Computer Engineering
基金 国防工业技术基础基金资助项目(Q072006C002-1) 航空基金资助项目(05F2037) 江苏省自然科学基金资助项目(BK2003091)
关键词 通用访问控制框架 使用控制模型 传输层驱动程序接口 Generalized Framework for Access Control(GFAC) Usage CONtrol model(UCON) Transport Driver Interface(TDI)
  • 相关文献

参考文献5

  • 1单智勇,孙玉芳.通用访问控制框架扩展研究[J].计算机研究与发展,2003,40(2):228-234. 被引量:21
  • 2Park J, Sandhu R. The UCONABC Usage Control Model[J]. ACM Trans. on Information and System Security, 2004, 7(1): 128-174, 200.
  • 3Janicke H, Cau A. A Note on the Formalisation of UCON[C]// Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. [S.l]: ACM Press, 2007: 163-168.
  • 4Katt B, Zhang Xinwen, Breu R. A General Obligation Model and Continuity: Enhanced Policy Enforcement Engine for Usage Control[C]//Proceedings of the 13rd ACM Symposium on Access Control Models and Technologies. [S.l.]: ACM Press, 2008: 123-132.
  • 5林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67

二级参考文献15

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2M Abrams, L LaPadula, K Eggers et al. A generalized framework for access control: An informal description. In: Proc of the 13th National Computer Security Conf. 1990. 134~14
  • 3Defense Information Systems Agency. Technical Architecture Framework for Information Management, Vol 6: Department of Defense Goal Security Architecture, 1996
  • 4Secure Computing Corporation. DTOS lessons learned report. Secure Computing Corporation, Tech Rep: DTOS CDRL A008.1997
  • 5Assurance in the fluke microkemel: Final report. Secure Computing Corp, Tech Rep: CDRL A003, 1999
  • 6Ray Spencer, Stephen Smalley, Peter Loscocco et al. The flask security architecture: System support for diverse security policies.University of Utah, Tech Rep: UUCS-98-014, 1998
  • 7N H Minsky, V Ungureanu. Unified support for heterogeneous security policies in distributed systems. In: The 7th USENIX Security Symposium. 1998
  • 8E Bertino, S Jajodia, P Samarati. Supporting multiple access ontrol policies in database systems. In: IEEE Symposium on Security and Privacy. Oakland, 1996
  • 9C Bidan, V Issarny. A configuration-based environment for dealing with multiple security policies in open distributed systems.The 2nd European Research Seminar on Advances in Distributed Systems, Zinal, Switzerland, 1997
  • 10S Jajodia, P Samarati, V Subrahmanian et al. A unified framework for enforcing multiple access control policies. The SIGMOD'97, Tucson, AZ, 1997

共引文献85

同被引文献30

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部