期刊文献+

访问控制系统的规则集模型及其检测算法

Rule Set Model and Its Checking Algorithm in Access Control System
下载PDF
导出
摘要 针对访问控制系统规则存在漏洞问题,提出一个建立在系统读写规则集基础之上的访问控制系统规则集模型及相应的模型检测算法,通过对系统状态的遍历,判断目标在权限提供某些许可的情况下是否可完成,并在目标可完成的情况下输出相应的策略。实验结果证明,在中等规模的系统中该算法有效。 This paper presents a rule set model which is used in access control systems and the corresponding model checking algorithm for loopholes which are brought by the rules in access control system.A method which search system states is used to determine if the goals can be achieved under the conditions that some permissions are given by rights.Corresponding strategies are output when the goals are achieved.Experimental results show that the algorithm is efficient in moderate systems.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第14期43-45,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773049)
关键词 访问控制系统 模型检测 变迁 access control system model checking transition
  • 相关文献

参考文献6

  • 1周从华,刘志锋.具有过去时态算子的计算树逻辑模型检测[J].计算机工程,2007,33(22):98-100. 被引量:2
  • 2李健,唐文忠,宋长福.角色访问控制技术在管理信息系统中的应用[J].北京航空航天大学学报,2003,29(6):534-538. 被引量:13
  • 3Li Xiaoou,Medina J M,Chapa S V.Applying Petri Nets in Active Database Systems[J].IEEE Transactions on Systems,Man,and Cybernetics,2007,37(4):482-493.
  • 4Zhang Nan,Ryan M,Guelev D P.Synthesising Verified Access Control Systems Through Model Checking[J].Journal of Computer Security,2008,16(1):1-61.
  • 5Huth M R A,Ryan M D.Binary Decision Diagramms[M] //Logic in Computer Science:Modelling and Reasoning About Systems.[S.l.] :Cambridge University Press,2004.
  • 6Zhang Nan,Ryan M,Schobbens P,et al.AcPeg[Z].(2006-01-01).http://www.cs.bham.ac.uk/~mdr/research/projects/05-Access Control/acpeg.

二级参考文献13

  • 1马林胜.[D].北京:北京航空航天大学机械工程及自动化学院,2002.
  • 2Kim K H. Boolean matrim theory and applications[M]. USD:Dekker, Marcel Incorporated, 1982.
  • 3Sanhu R S, Coyne E J, Feinstein H L, et al. Role-base access models[J]. EIII Computer, 1996,29(2).
  • 4Ahn G J, Arvisandhu. Role-based authorization constraints specification[ J]. ACM Transcations on Information and System Security,2002,3:207 - 226.
  • 5Clarke E M,Grumberg O,Peled D A.Model Checking[M].Cambridge,MA:The MIT Press,1999.
  • 6Ben-Ari M,Manna Z,Pnueli A.The Temporal Logic of Branching Time[J].Acta Informatica,1983,20(1):207-226.
  • 7Aho A V,Hopcroft J E,Ullman J D.The Design and Analysis of Computer Algorithms[M].[S.l.]:Addison Wesley,1974.
  • 8Burch J,Clarke E,MaMillan K,et al.Symbolic Model Checking:1020 States and Beyond[C]//Proc.of IEEE Symposium on Logic in Computer Science.1990.
  • 9Bryant R E.Graph-based Algorithms for Boolean Function Manipulation[C]//Proc.of the 27th ACM/IEEE Design Automation Conference.1986.
  • 10McMillan K L.Symbolic Model Checking[M].[S.l.]:Kluwer Academic Publishers,1993.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部