期刊文献+

基于UCON的空间访问控制模型的研究 被引量:1

A Study on Spatial Access Control Model Based on UCON and Its Implementation
下载PDF
导出
摘要 虽然UCON模型包含了传统访问控制、信任管理、DRM三个问题领域,是下一代访问控制技术的发展方向,但是它不能解决空间数据库系统和基于移动用户位置的信息服务系统中空间动态授权。本文将空间授权规则引入到UCON模型中,提出了一个支持空间特性的面向使用的访问控制模型GEO-UCON,并给出了在空间环境下的授权规则,扩展了传统的UCON模型的空间安全描述能力。 Although the UCON model includes three different areas of traditional access control, trust management, DRM and it is the development direction of next generation of access control model, but it can not solve the problem of spatial database systems and the dynamic authorization of the system of moving user location based information service system. We introduce authorization rules into space UCON model, propose a support for the use of the space characteristics of the access control model GEO-UCON, and suggest the authorization rules in the space environment, thus expanding the traditional model of space security UCON describing ability.
作者 马勇 张洪军
机构地区 镇江市信息中心
出处 《信息化研究》 2010年第2期8-11,共4页 INFORMATIZATION RESEARCH
关键词 空间数据库 面向使用的访问控制 授权规则 基于位置服务 spatial database UCON authorization rules location-based service
  • 相关文献

参考文献5

  • 1何永忠,李斓,冯登国.多级安全DBMS的通用审计策略模型[J].软件学报,2005,16(10):1774-1783. 被引量:11
  • 2BERTINO E, CATANIA B, DAMIANI M L. GEO-RBAC: A spatially aware RBAC [ C]//Proceedings of the lOth ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2005: 29-37.
  • 3RAVI S, BHAMIDIPATI V, MUNAWER Q. The ARBAC97 model for role-based administration of roles [ J ]. ACM Trans on Information and Systems Security (TISSEC), 1999,2( 1 ) : 105-135.
  • 4JAEHONG P, RAVI S. Originator control in usage control [J]. ACM Trans on Information and System Security, 2006, 6(7) : 114-116.
  • 5ALEXANDER P, MANUEL H, DAVID B. Distributed usage control[ J]. Communications of the ACM,2006,49 : 39-44.

二级参考文献12

  • 1Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. on Software Engineering, 1993,19(9):886-901.
  • 2Biskup J, Flegel U. Transaction-Based pseudonyms in audit data for privacy respecting intrusion detection. LNCS 1907, Berlin:Springer-Verlag, 2000.28-48.
  • 3Sandhu R, Chen F. The multilevel relational (MLR) data model. ACM Trans. on Information and System Security, 1998,1(1):93-132.
  • 4Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593 -607.
  • 5National Computer Security Center. A guide to understanding security modeling in trusted systems. Technical Report,NCSC-TG-010, National Computer Security Center, 1992.
  • 6Jajodia S, Samarati P, Subrahmanian VS. A logical language for expressing authorizations. In: Proc. of the 1997 IEEE Symp. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1997.31-42.
  • 7Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning.ACM Trans. on Database Systems (TODS), 1998,23(3):231-285.
  • 8National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report,NCSC-TG-030, National Computer Security Center, 1993.
  • 9DE BL, LaPadula LJ. Secure computer systems: Unified exposition and multics interpretation. Technical Report, MTR-2997,Bedford: MITRE Corporation, 1976.
  • 10Bertino E, Bettini C, Ferrari E, Samarati P. A temporal access control mechanism for database systems. IEEE Trans. on Knowledge and Data Engineering, 1996,8(1):67-80.

共引文献10

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部