期刊文献+

基于隐私本体的个性化访问控制模型 被引量:1

Privacy Ontology-based Personalized Access Control Model
原文传递
导出
摘要 在信息收集频繁化、普遍化的今天,由用户制定隐私策略、自主控制个人信息访问的方式,可以最大程度满足用户的隐私保护需求。构建的隐私本体,客观反映了隐私保护领域普遍认可的知识,体现了用户最根本的隐私保护需求。基于隐私本体的个性化访问控制模型采用基于隐私本体的通用策略与个性策略相结合的模式,通过多级链式激活的方式实现用户不同粒度、灵活多变的个性化隐私保护需求。 With more and more information collected via networks, customers' requirements for privacy protection could he satisfied by making privacy policies By themselves. Privacy ontology reflects the common knowledge of privacy and customers' basic needs for privacy protection. Privacy ontology-based personalized access eontrol(PO-PAC)moclel adopts common policies in combination with personalized policies based on privacy ontology. Users' personalized requirements with different granularity are realized by multi-level chain activation mode.
出处 《信息安全与通信保密》 2011年第2期67-70,73,共5页 Information Security and Communications Privacy
关键词 隐私本体 个性化隐私策略 访问控制 链式激活 privacy ontology personalized privacy policy access control chain activation
  • 相关文献

参考文献8

  • 1SANDHU R, COYNE E J, FEINSTEIN H L, et al. Role Based Access Control Models[J]. IEEE Computer, 1996, 29(02): 38-47.
  • 2BYUN J, LI N H. Purpose based Access Control for Privacy Protection in RelationalDatabase Systems[J]. The VLDB Journal, 2008, 17(04): 603-619.
  • 3CRANOR L F, LANGHEINRICH M, MARCHIORI M. The Platform for Privacy Preferences 1.0(P3P1.0) Speeification[EB/ OL]. (2002-04-16). http: //www.w3.org/TR/P3P/.
  • 4HECKER M, DILLON T. Privacy Support and Evaluation on an Ontological Basis[C]//Data Engineering Workshop. IEEE 23rd International Conference.Istanbul: Data Engineering Workshop, 2007: 221-227.
  • 5HECKER M, DILLON T S, CHANG E. Privacy Ontology Support for E-Commerce[J]. Internet Computing, 2008, 12(02) : 54-61.
  • 6程剑豪,蒋兴浩,孙锬锋,周晓军.基于多元判决的动态访问控制架构的研究[J].信息安全与通信保密,2009,31(4):44-46. 被引量:3
  • 7周晓军,蒋兴浩,孙锬锋.RB-RBAC模型的研究与改进[J].信息安全与通信保密,2010,7(4):100-102. 被引量:8
  • 8QUN N, TROMBETTA A, ERTINO E, et al. Privacy-Aware Role Based Access Control[J]. Security & Privacy, 2009, 07(04): 35-43.

二级参考文献10

  • 1Ravi Sandhu,David Ferraiolo,Richard Kuhn.American National Standard for Information Technology-Role Based Access Control[S].ANSI INCITS 359-2004,US:American National Standards Institute,Inc,2004:02-14.
  • 2D.F.Ferraiolo.Role-Based Access Control,Computer Security Series[EB/OL].D.R.Kuhn,R.Chandramouli.Version 1.US:Artech House,2003:69-88[Sep 2008].http://csrc.nist.gov/groups/ SNS/rbac/documents/rbac-book.html.
  • 3Richard Fernandez.Enterprise Dynamic Access Control(EDAC) Compliance with the Role-Based Access Control(RBAC) Standard ANSI/INCITS 359-2004[EB/OL].US National Institute of Standards and Technology(NIST),May 2005[Sep 2008].http://csrc.nist.gov/groups/SNS/rbac/documents/standards/EDA Ccompliance.pdf.
  • 4Richard Fernandez.Enterprise Dynamic Access Control (EDAC).Version 2[EB/OL].US:National Institute of Standards and Technology(NIST),Jan,2006[Sep 2008].http://csrc.nist.gov/groups/SNS/rbac/documents/standards/EDACv2overview.pdf.
  • 5Scott Kelly,Amit Agarwal.TCG Trusted Network Connect TNC Architecture for InteroperabilitySpecification Version 1.3 Revision 6[R].US:Trusted Computing Group,Inc.April 2008 (TCG).
  • 6Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(02):38-47.
  • 7Al-Kahtani M,Sandhu R S.A Model for Attribute-Based User-Role Assignment[C]//Proceed-ings of the 18th Annual Computer Security Applications Conference,[s.l.]:IEEE,2002:353-362.
  • 8Park J,Sandhu R.The UCONABC Usage Control Model[J].ACM Trans,on Information and System Security,2004,07(01):128-174.
  • 9Al-Kahtani M,Sandhu R S.Rule-Based RBAC with Negative Authorization[C]//Proceedings of the 20th Annual Computer Security Applications Conference,[s.l.]:IEEE,2004:405-415.
  • 10程剑豪,蒋兴浩,孙锬锋,周晓军.基于多元判决的动态访问控制架构的研究[J].信息安全与通信保密,2009,31(4):44-46. 被引量:3

共引文献8

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部