期刊文献+

全程一致访问控制体系研究 被引量:1

Process-Consistent Access Control System
下载PDF
导出
摘要 针对系统中的访问控制体系由各种访问控制机制堆彻而成而带来的系统访问控制不一致问题,本文提出了全程一致访问控制的概念,随后给出了全程一致访问控制体系的结构、分工及准则,以指导全程一致访问控制体系的构建,然后采用了原型系统对全程一致的访问控制体系进行了验证.采用该体系,不但能有效发挥系统中各访问控制机制的优势,还能降低安全投入成本. At present, many access control systems consist of a variety of access control mechanisms with no relation to each other, which cause the problem of inconsistency. To solve the problem, the paper presented the concept of full-process-consistent access control. Then, the structure, division and guidelines were introduced to guide the construction of full-process-consistent access control system. Finally, the system was verified using a prototype system. With this system, the advantages of various access control mechanisms could be effectively brought into play and the cost could be reduced.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期698-702,共5页 Journal of Beijing University of Technology
基金 国家'八六三'计划资助项目(2009AA01Z437) 国家'九七三'计划资助项目(2007CB311100) 中国科学院软件研究所信息安全国家重点实验室开放课题
关键词 访问控制 全程一致 SOC 访问控制路径 access control full-process-consistent SOC access control path
  • 相关文献

参考文献9

  • 1BISHOP M. Computer security : art and science[ M ]. Boston: Addison Wesley, 2002 : 31-44.
  • 2PATRICK R. NCSC-TG-003 A guide to understanding discretionary access control in trusted systems [ S ]. Version 1. Maryland: NCSC, 1987: 1-29.
  • 3SANDHU R. Role-based access control models [ J]. IEEE Computer, 1996, 29 (2) : 38-47.
  • 4SANDHU R. Lattice-based access control models[ J]. IEEE Computer, 1993, 26(11) : 9-19.
  • 5周志波.结合安全域的思想建设安全运营中心[J].信息安全与通信保密,2006,28(6):87-89. 被引量:5
  • 6CHRISTOPHER M. AAA Protocols: authentication, authorization, and accounting for the internet [ J ]. IEEE Intemet Computing, 1999, 3(6) : 75-59.
  • 7ADAMS A, LLOYD S. Understanding PKI: concepts, standards, and deployment considerations[ M]. 2nd Edition. Boston: Addison Wesley, 2002 : 21-35.
  • 8沈昌祥.基于积极防御的安全保障框架[J].中国信息导报,2003(10):50-51. 被引量:22
  • 9沈昌祥.构建积极防御综合防范的防护体系[J].信息安全与通信保密,2004(5):18-19. 被引量:19

共引文献43

同被引文献9

  • 1姚键,孙昌平,孙虎,茅兵,黄皓,谢立.基于策略的安全管理研究[J].计算机应用与软件,2005,22(3):115-119. 被引量:3
  • 2周志波.结合安全域的思想建设安全运营中心[J].信息安全与通信保密,2006,28(6):87-89. 被引量:5
  • 3李晓峰,冯登国,徐震.基于扩展XACML的策略管理[J].通信学报,2007,28(1):103-110. 被引量:10
  • 4Aib I,Agoulmine N, Fonseca M S,et al. Analysis of policy management models and specification languages [C]//Network Control and Engineering for QoS, Security and Mobility II, IFIP TC6/WG6. 2 and WG6. 7 Second International Conference. Muscat: Kluwer Academic Publishers, 2003 : 26-50.
  • 5Damianou N, Dulay N, policy specification langu International Workshop Systems and Networks Lupu E, et al. The ponder age[C]//Proceedings of the on Policies for Distributed London: Springer-Verlag,2001:18-38.
  • 6Ribeiro C, Zuquete A, Ferreira P, et al. SPL : An access control language for security policies with complex constraints[C]//Proceedings of the Network and Dis- tributed System Security Symposium. San Diego: IEEE Computer Society, 2001 : 89-107.
  • 7Farrell J. An Object-Oriented Approach to Program- ming Logic and Design [M]. 4th Ed. Boston: Course Technology, 2012.
  • 8DuBios P. MySql Cookbook [M]. 2nd Ed. Sebastopol: O' Reilly, 2006.
  • 9Zhang Yingchun. An enterprise safety gateway based on Netfilter /Iptables[C]/ / International Conference on Advanced Materials and Information Technology Processing. Guangzhou: Trans Technology Publica tions,2011:484-488.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部