期刊文献+

民航网络自保护模型及其访问控制研究 被引量:1

Research on Network Self-protection System Model of Civil Aviation and Its Access Control
下载PDF
导出
摘要 提出一种民航网络自保护系统模型,设计其系统结构与分层响应框架,在系统中设计了基于角色的访问控制策略和基于Agent的通信加密机制.实验证明,该系统模型的访问控制策略及通信机制能够有效保护网络自保护系统中的数据安全. This paper presents a civil aviation network self-protection model. The model's system structure and the layered response framework of this system model were designed. The role based access control policy and the agent based communication security mechanism of this system were proposed. Experimental results demonstrate that access control policy and communication mechanism of this system's model can effectively protect data security.
出处 《微电子学与计算机》 CSCD 北大核心 2010年第11期59-63,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60776807) 国家"八六三"计划重点课题(2006AA12A106) 天津市科技支撑计划重点项目(07ZCKFX01700) 中国民航科技基金项目(RKXZY0814) 中央高校基本科研业务费中国民航大学专项项目(ZXH2009A006)
关键词 自保护 安全代理 安全域 通信 访问控制 self-protection intelligent agent security domain communications assess control
  • 相关文献

参考文献7

二级参考文献25

  • 1Diffiew, Hellmanm E. New directions in cryptography[J]. IEEE Tram IT, 1976,22(6):644-654.
  • 2杨明,胥光辉,齐望东译.密码编码学与网络安全-原理与实践(第二版)[M].北京:电子工业出版社,2001:185.
  • 3S. M. Bellovin, M. Merritt. Encrypted Key Exchange:Password-Based Protocols Secure Against Dictionary Attacks[M]. Oak-land: Proceedings of the I. E, E. E symposium on Research in Security and Privacy, 1992:72-84.
  • 4吴世忠译.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000:372.
  • 5Ravi Sandhu,Qamar Munawer.How to Do Discretionary Access Control Using Roles[A].Proc of the ACM Workshop on Role-Based Access Control Association for Computing Machinery[C].1998.47-54.
  • 6E Bertino,B Catania,E Ferrari.A System to Specify and Manage Multipolicy Access Control Models[A].Proc of the 3rd Int'l Workshop on Policies for Distributed Systems and Networks[C].2002.116-127.
  • 7SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models [ J]. IEEE Computer, 1996, V29(2):38-47.
  • 8FERRAIOLO D F, SANDHU R, GAVRILA S A, et al. Proposed NIST standard for role-based access control[J]. ACM Transaction on Information and System Security, 2001, 4(3) : 224 - 274.
  • 9KAPADIA A, AL- MUHTADI J, CAMPBELL D, et al. IRBAC 2000: Secure Intereperability Using Dynamic Role Translation[ R]. Chicago: University of Illinois, 2000.
  • 10Ferraiolo D,,Kuhn R.Role-Based access controls[].Proceedings of theth NIST-NCSC National Computer Security Conference.1992

共引文献86

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部