期刊文献+

基于XML的上下文约束访问控制策略管理

XML-Based Context-Constraint Access Control Policy Management
下载PDF
导出
摘要 结合当前研究成果和自身实践中应用系统访问控制需求的特点,从灵活、通用、易实现的角度和标准参考模型的高度提出了一种带上下文约束的访问控制理论模型,阐述了该模型的理论以及基于模型的应用系统访问控制体系架构;进而在理论模型和访问控制架构的基础上,用一种基于XML的策略描述语法规范X-Grammar对访问控制策略进行描述和建模,给出了模型中各实体和关系的形式定义。最后讨论访问控制系统的设计与实现,并给出了整体的功能描述和结构设计。 With concern of the current research results as well as the features of the demands for access control of the Web-based application system,the authors propose a context constraint access control theory model on the level of standard reference model,from the perspective of flexibility,generality,and feasibility,and elaborate on the theory of this model and the architecture of access control system.Then the authors give the description and modeling of the access control policy and defines the entities and relations in the model by using a XML-based policy specification grammar called X-Grammar.Finally the overall function description and structure design is given,and an engineering method to elicit and define context constraints is raised.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第4期539-546,共8页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家高技术研究发展计划专项经费(2008AA01Z203)资助
关键词 访问控制 上下文约束 访问控制策略描述 access control context constraint access control policy specification
  • 相关文献

参考文献15

  • 1Ferraiolo D, Chandramouli : access control. Security, 2001 Sandhu R, Gavrila S, et al. proposed NIST standard for role-based ACM Transactions on Information System , 4 ( 3 ) : 224-274.
  • 2Kumar A, Karnik N, Chafle G. Context sensitivity in role-based access control // ACM SIGPOS Operating System Review. New York, 2002:53-66.
  • 3Hu J, Weaver A C. A dynamic, context-aware security infrastructure for distributed heahhcare applications // Proceedings of First Workshop on Pervasive Security, Privacy and Trust (PSPT2004). Boston, 2004.
  • 4Neumann G, Mark S. An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 2004, 7 (3) : 392-427.
  • 5Matthew J M, Mustaque A. Generalized role based access control // Proceeding of the 21st International Conference on Distributed Computing System. Phoenix, 2001 : 391-398.
  • 6Chandaran S, Joshi J B D. LoT-RBAC: a location and time-based RBAC model // Proceedings of the 6th International Conference on Web Information Systems Engineering ( WISE' 05 ). New York, 2005 : 361-375.
  • 7Ren Xiaoli , Liu Lu, Lu Chenggong. An objectdependent and context constraints-aware access control approach based on RBAC // 2nd International Conference on Research and Practical Issues of Enterprise Information Systems. Bcijing, 2007: 1507- 1514.
  • 8Zhang Zhikun, Xiao Jianguo, Li Hanyi. A contextconstraint access control model in accounting systems// Frontiers in Enterprise Integration. London: Taylor @ Francis Group, 2005:21-25.
  • 9张治坤,肖建国.上下文约束的访问控制模型与框架[J].中山大学学报(自然科学版),2009,48(S1):289-291. 被引量:1
  • 10Zhang Zhikun, Xiao Jianguo, Geng Youping, et al. The XML-based context-constraint access control policy // 2009 International Conference on New Trends in Information and Service Science. WuHan, 2009: 1009- 1013.

二级参考文献4

  • 1BERTINO E,BONATTI P A,FERRARI E.TRBAC:a temporal role-based access control model[].ACM Transactions on Information and System Security (TISSEC).2000
  • 2MARK S,GUSTAF N.An integrated approach to engineer and enforce context constraints in RBAC environments[].ACM Transactions on Information and System Security.2002
  • 3Ahn,G J,Sandhu,R.Role-based authorization constraints specification[].ACM Transactions on Information and System Security.2000
  • 4Arun Kumar,Neeran Karnik,Gifish Chafle.Context Sensitivity in Role—Based Access Control[].ACM SIGOPS Operating Systems Review.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部