期刊文献+

带周期时间特性的自主访问控制委托树模型 被引量:3

Delegation tree model for DAC with character of periodicity constraints
下载PDF
导出
摘要 传统自主访问控制(DAC)不具有时间敏感性,也不支持权限委托策略,这使得DAC很难满足对时间敏感的需求,而且对授出权限使用的不可控也可能造成权限滥用而带来安全隐患。提出了带周期时间特性的自主访问控制委托树模型(PDACDTM)。PDACDTM不仅在DAC中引入了周期时间、访问持续时间、访问次数和时序依赖来限制主体对客体的访问,而且在权限委托方面提出了委托树模型。该委托树模型通过委托深度和委托广度来限制委托权限的传播,同时还支持复合权限委托。PDACDTM以树形结构刻画了委托权限的传播,使得委托关系的处理更为明确、完备,也更加灵活且易维护。 Traditional Discretionary Access Control(DAC) is not time-sensitive and doesn't support the policy of permission delegation yet, which makes DAC difficult to meet the demand of time-sensitivity, and the using of granted permission with out control would bring risk by permission abuse.Therefore, a delegation tree model for DAC with periodicity constraints and time characters (PDACDTM) is proposed in this paper.PDACDTM not only introduces periodic time, durative access time,visits and timing-dependent to restrict subject's accessing to object,but also puts forward a delegation tree model in permission delegation.The delegation tree model restricts the propagation of permission by depth and width,in addition it supports the delegation of complex permissions.PDACDTM uses the structure tree to depict the spread of delegation permissions,it makes the relationship of delegation clearer, more comprehensive,more flexible and easier to be maintained.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第6期93-98,180,共7页 Computer Engineering and Applications
基金 四川省科技厅项目(No.2008JY0105-2) 四川省教育厅项目(No.07ZA091)
关键词 自主访问控制 周期限制 委托树 discretionary access control periodicity constraints delegation tree
  • 相关文献

参考文献16

  • 1Harrison M A, Ruzzo W L, Ullman J D.Protection in operating systems[J].Communications of the ACM (CACM), 1976, 19 (8) : 461-471.
  • 2Solworth J A, Sloan R H.A layered design of discretionary ac- cess controls with decidable safety properties[C]//Proeeedings of IEEE Symposium on Research in Security and Privacy,May 2004.
  • 3Li N, Tripunitara M V.On safety in discretionary access control[C]// Proc IEEE Symp Security and Privacy,2005.
  • 4Graham G S, Denning P J.Protection-principles and practice[C]// Proceedings of the AFIPS Spring Joint Computer Conference, volume 40,AFIPS Press,May 16-18,1972:417-429.
  • 5Dranger S, Sloan R H, Solworth J A.The complexity of discre- tionary access control[C]//Advances in Information and Comput- er Security.BerlirdHeidelberg: Springer, 2006: 405-420.
  • 6Sandhu R S, Munawer Q.How to do discretionary access con- trol using roles[C]//ACM Workshop on Role-Based Access Con- trol, 1998:47-54.
  • 7Moffett J D, Sloman M S, Twidle K P.Specifying discretionary access control policy for distributed systems[J].Computer Com- munications, 1990,13 (9):571-580.
  • 8Moffett J D.Specification of management policies and discretion- ary access control[C]//Network and Distributed Systems Manage- ment.[S.l.]: Addison-Wesley, 1994.
  • 9Rissanen E,Sadighi Firozabadi B,Sergot M J.Towards a mecha- nism for discretionary overriding of access control(position pa- per)[C]//Proc 12th International Workshop on Security Protocols, Cambridge,April 2004.
  • 10Bugliesi M, Colazzo D, Crafa S.Type based discretionary access controI[C]//LNCS 3170:CONCUR'04-Concurrency Theory,Volume Springer, 2004: 225-239.

二级参考文献19

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 3[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 4[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 5[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 6[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 7Bertino E. , Bettini C. , Ferrari E. , Samarati P.. A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 1996, 8(1) : 67-80
  • 8Bertino E. , Bettini C. , Ferrari E. , Samarati P.. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 1998, 23(3) : 213-285
  • 9Zhang L. , Ahn G. J. , Chu B. T.. A rule-based framework for role-based delegation. In: Proceedings of the 6th ACM symposium on Access Control Models and Technologies, Virginia,USA, 2001, 153-162
  • 10Jajodia S. , Samarati P. , Subrahmanian V. S. , Bertino E..Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2001, 26(2): 214-260

共引文献68

同被引文献38

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 2Weiser M.The computer for the twenty-first century[J]. Scientific American, 1991,265 (3) 94-104.
  • 3Wu I,Li X,Song M,et al.Security in ad hoc networks and pervasive computing[J].Security and Communication Networks, 2010,3 (5) : 359-361.
  • 4Hilary H H.Security is fuzzy:applying the fuzzy logic paradigm to the multipolicy paradigm[C]//Proceedings of the ACM Workshop on New Security Paradigms, 1993. New York:ACM, 1993: 175-184.
  • 5Janczewski L J, Portougal V.Need-to-know principle and fuzzy security clearances modeling[J].Information Man- agement & Computer Security,2000,8 (5):210-217.
  • 6Erwig M, Schneider M.Spatio-temporal predicates[J].IEEE Transactions on Knowledge and Data Engineering,2002, 14(4) : 881-901.
  • 7Li L,Cao T.Context-role based access control model for ubiquitous computing environment[J].Asian Journal of Information Technology, 2008,7 (2) :74-78.
  • 8Khan M, Sakamura K.Context-aware access control for clinical information systems[C]//Proceedings of the In- ternational Conference on Innovations in Information Technology (IIT ), 2012.United Arab Emirates : IEEE, 20 l 2 : 123-128.
  • 9郭亚军,王亮,洪帆,韩兰胜.基于信任的普适计算的动态授权模型[J].华中科技大学学报(自然科学版),2007,35(8):70-73. 被引量:5
  • 10Wu Y, Yao H, Bao F. Minimizing SSO effort in verifying SSL anti-ph- ishing indicators [ C]//Proceedings of The Ifip Tc 11 23rd International Information Security Conference. Springer US ,2008:47 - 61.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部