期刊文献+

访问控制模型研究综述 被引量:8

Survey of Research on Access Control Model
下载PDF
导出
摘要 访问控制是一种重要的信息安全技术。为了提高效益和增强竞争力,许多现代企业采用了此技术来保障其信息管理系统的安全。对传统的访问控制模型、基于角色的访问控制模型、基于任务的访问控制模型等几种主流模型进行了比较详尽地论述和比较,并简介了有望成为下一代访问控制模型的UCON模型。 Access control is an important information security technology.To enhance benefits and increase competitive power,many modern enterprises have used this technology to secure their information manage systems.In this paper,several main access control models,such as traditional access control models,role-based access control models,task-based access control models,and so on,are discussed and compared in detail.In addition,a new model called UCON is introduced,which may be a promising model for the next generation of access control.
出处 《计算机与数字工程》 2010年第7期115-119,共5页 Computer & Digital Engineering
关键词 角色 访问控制 安全 任务 role access control security tasks
  • 相关文献

参考文献15

  • 1刘宏月,范九伦,马建峰.访问控制技术研究进展[J].小型微型计算机系统,2004,25(1):56-59. 被引量:76
  • 2林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 3Ravi S.Sandhu,Edward J.Coyne,Hal L.Feinstein,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 4Ferraiolo D.F.,Sandhu R.,Gavrila S.,et al.Proposed NIST Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 5Xu Wei,Wei Jun,Liu Yu,et al.SOWAC:A Service-Oriented Workflow Access Control Model[C] //Proceedings of the 28th Annual International Computer Software and Applications Conference(COMPSAC'04),2004,1:128-134.
  • 6Rafael R.Obelheiro,Joni S.Fraga.Role-Based Access Control for CORBA Distributed Object Systems[C] //Proceedings of the Seventh International Workshop on Object-Oriented Real-Time Dependable Systems(WORDS 2002),2002:53-60.
  • 7Bo Lang,You Lu,Xin Zhang,et al.A Flexible Access Control Mechanism Supporting Large Scale Distributed Collaboration[C] //Proceedings of The 8th International Conference on Computer Supported Cooperative Work in Design,2004,1:500-504.
  • 8Chang.N.Zhang,Cungang Yang.An Object-Oriented RBAC Model for Distributed System.2001 Working IEEE/IFIP Conference on Software Architecture(WICSA 2001),Amsterdam,The Netherlands.IEEE Computer Society,2001:24-32.
  • 9Rafae Bhatti.Application of Cryptographic Approaches Toward an Effective Distributed Access Control Model.CS-555 Project Report,2004.
  • 10Guangsen Zhang,Manish Parashar.Dynamic Context-aware Access Control for Grid Applications[C] //Proceedings of the 4th International Workshop on Grid Computing(GRID 2003),17 November 2003,Phoenix,AZ,USA,Proceedings.IEEE Computer Society,2003:101-108.

二级参考文献4

共引文献352

同被引文献42

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部