期刊文献+

基于双授权链集合的访问控制模型

Double-authorization Chain Sets Based Access Control Model
下载PDF
导出
摘要 信息技术的迅速发展使数据库面临的安全问题更加复杂和多样,数据库作为信息系统重要数据的存储和处理核心,往往成为最吸引攻击者的目标。访问控制技术是数据库安全领域的一个重要研究方向,传统的访问控制技术已越来越不能满足现代数据库的安全需求。在传统的自主访问控制机制研究的基础上,提出了一种基于双授权链集合的访问控制模型(DACS)。该模型具有常规授权管理和阻断授权管理功能,支持8种授权和收权操作,同时具备阻断授权机制和独立收权机制。 With the rapid development of information and technology,database faces more serious security situation. As the center of storage and process for the important data,databases often become the targets of attacks. Research of the access control has been an important part in the field of database security, but the traditional access control technologies could not satisfy the requirements of modern database security. On the basis of traditional DAC mechanism research, we proposed a double-authorization chain sets based access control model(DACS), which supports 8 kinds of authorization management functions including normal authorization and denial authorization, and has denial authorization mechanism and non-cascade revoking mechanism.
出处 《计算机科学》 CSCD 北大核心 2010年第7期160-164,228,共6页 Computer Science
基金 国家自然科学基金资助项目(60673127) 863国家高技术研究发展计划基金资助项目(2007AA01Z404) 江苏省科技支撑计划(BE2008135)资助
关键词 安全数据库 访问控制 授权链集合 Secure database,Access control,Authorization chain sets
  • 相关文献

参考文献9

  • 1Bertino E,Sandhu R.Database Security-concepts,Approaches,and Challenges[J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19.
  • 2Bertino E,Samarati P,Jajodia S.An Extended Authorization Model for Relational Databases[J].IEEE Transactions on Knowledge and Data Engineering,1997,9(1):85-101.
  • 3Sandhu R S,Coyne E J,Feinsein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 4Ferraiolo D F,Sandhu R,Gavrila S.Proposed NIST Standard for Role-based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 5Ferraiolo D,Kuhn D R,Chandramouli R.Role-based Access Control[M].Artech House,Computer Security Series,2003.
  • 6Bertino E,Bettini C.An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning[J].ACM Transactions on Database Systems,1998,23(3):231-285.
  • 7Bertino E,Bettini C,Ferrari E,et al.A Temporal Access Control Mechanism for Database Systems[J].IEEE Transactions on Knowledge and Data Engineering,1996,8(1):67-80.
  • 8Oracle.The Virtual Private Database in Oracle9iR2[EB/OL].http:∥otn.oracle.com/deploy security /oracle9iR2/Pdf/ VPD9ir2twp.pdf,2000.
  • 9Biba K J.Integrity Considerations for Secure Computer Systems[R].ESD-TR-76-372.Bedford,Massachusetts:USAF Electronic Systems Division,Hanscom Air Force Base,1977.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部