期刊文献+

基于网络环境安全的可信访问控制策略 被引量:1

One trusted computing access control strategy based on network environment security
下载PDF
导出
摘要 为了抵御网络系统受到非法访问,文章在基于RBAC访问控制模型的基础上,结合可信计算的思想和原则,提出了一种基于环境的ERBAC访问控制模型。该模型将角色与网络系统环境的安全性相关联,只有当用户的环境条件达到一定的安全阈值时,其对应角色的权限方案才会生效,并能访问相应资源。最后结合实例证明了该模型及其语义实施的正确性。 To defend network system against the harm done by unauthorized access.basing on theory and conception of trusted computing and Role Based Access Control(RBAC) model,this paper proposes an access control model named Environment Role Based Access Control(ERBAC).This model correlates the role with system environment security.When an user′s environment is secure enough,the permissions corresponding to its roles are valid,and the user is allowed to access resources.An access control application instance is given to prove the effectiveness of the model and semantics.
出处 《信息与电子工程》 2010年第4期463-466,共4页 information and electronic engineering
关键词 基于角色的访问控制 ERBAC访问控制模型 可信度量 网络安全 Role Based Access Control ERBAC model trust measurement network security
  • 相关文献

参考文献7

  • 1董理君,余胜生,杜敏,周敬利.一种基于环境安全的角色访问控制模型研究[J].计算机科学,2009,36(1):51-54. 被引量:12
  • 2Sandhu R S,Coyne E J,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 3刘伟,刘嘉勇.一种基于扩展角色的访问控制模型和方法[J].信息与电子工程,2009,7(1):76-79. 被引量:4
  • 4Covington M J,Long W,Srinivasan S,et al.Securing context-aware applications using environment role[C] // College of Computing Georgia Institute of Technology Atlanta,Georgia USA:[s.n] ,2000:10-20.
  • 5Miao Liu,He-Qing Guo,Jin-Dian Su.An attribute and role based access control model for Web services[C] // Machine Learning and Cybernetics,Proceedings of 2005 International Conference,Guangzhou:[s.n] ,2005:1302-1306.
  • 6Sadnghi A Selhorst M Stuble C.TCG TPM Main Specification[Z].Version 1.2 Revision 94,Part1,Design Principles,2006.
  • 7Sadnghi A Selhorst M Stuble C.TCG TPM Main Specification[Z].Version 1.2 Revision 94,Part2,TPM Structures,2006.

二级参考文献19

共引文献14

同被引文献7

  • 1XU L,Chainan S,Takizawa H. Resisting Sybil Attack By Social Network and Network Clustering[A].Seoul,2011.15-21.
  • 2Fong L. Preventing Sybil Attacks by Privilege Attenuation:A Design Principle for Social Network Systems[A].Oakland,California,2011.263-278.
  • 3Huber M,Mulazzani M,Kitzler G. Friend-in-the-middle attacks,Exploiting Social Networking Sites foe Spam[J].IEEE Computer Society,2011,(03):28-34.
  • 4Ding X,Zhang L,Wan Z. A Brief Survey on De-anonymization Attacks in Online Social Networks[A].Taiyuan,2010.611-615.
  • 5Tripathy B K,Panda G K. A New Approach to Manage Security Against Neighborhood Attacks in Social Networks[A].athens,Greek,2010.264-269.
  • 6Zhou B,Pei J. Preserving privacy in social networks against neighborhood attacks[A].ICDE,2008.506-515.
  • 7Du X,Guizani M,Xiao Y. A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks[J].{H}IEEE Transactions on Wireless Communications,2009,(03):1223-1229.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部