期刊文献+

网络安全中访问控制技术的研究

下载PDF
导出
摘要 本文主要从访问控制的基本理论入手,对传统的访问控制技术,强制访问控制和自主访问控制做了的探讨,并在此基础之上,着重分析和研究了RBAC技术,通过对RBAC的原理与特点研究,分析了RBAC访问控制技术的优点。
作者 曾峰 孙同东
出处 《福建电脑》 2011年第8期58-59,73,共3页 Journal of Fujian Computer
  • 相关文献

参考文献3

二级参考文献12

  • 1MARTIN E. Automated test generation for access control policies [ C ]//Proc of Conference on Object-Oriented Programming Systems, Languages, and Applications. New York: Association for Computing Machinery, 2006:752-753.
  • 2FISLER K, KRISHNAMURTHI S, MEYEROVICH L A, et al. Verification and change-impact analysis of access-control policies [ C ]// Proc of the 27th International Conference on Software Engineering. New York : Association for Computing Machinery, 2005:96-205.
  • 3KNORR K. Dynamic access control through Petri net workflows [ C]//Proc of the 16th Annual Computer Security Applications Conference. New York : IEEE Computer Society,2000 : 159-167.
  • 4KNORR K. Multilevel security and information flow in Petri net workflows[ C]//Proc of the 9th International Conference on Telecommunication Systems-Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems. 2001:9-20.
  • 5JIANG Yi-xin, LIN Chuang, YIN Hao, et al. Security analysis of mandatory access control model [ C ]//Proc of IEEE International Conference on Systems, Man and Cybernetics. New York: Institute of Electrical and Electronics Engineers Ine, 2004: 5013-5018.
  • 6ZHANG N, RYAN M, GUELEV D P. Evaluating access control policies through model checking[ C]//Proc of the 8th Information Security Conference. Berlin : Springer-Verlag,2005:446- 460.
  • 7SCHAAD A, LOTZ V, SOHR K. A model checking approach to analysis organizational controls[ C]//Proc of the 11 th ACM Symposium on Access Control Models and Technologies. New York: Associa- tion for Computing Machinery,2006 : 139-149.
  • 8SCHAAD A, MOFFETT J. A lightweight approach to specification and analysis of role-based access control extensions [ C]//Proc of ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, 2002: 13-22.
  • 9洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 10严悍,张宏,许满武.基于角色访问控制对象建模及实现[J].计算机学报,2000,23(10):1064-1071. 被引量:58

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部