期刊文献+

面向IMA的网络文件系统访问控制分析与设计

Analysis and Design of Access Control in Network File System for IMA System
下载PDF
导出
摘要 为了解决面向IMA的网络文件系统访问控制问题,分析了其中的访问控制,并提出一种访问控制的设计方案。采用网络文件锁,通过对文件的上锁和解锁,实现多个分区互斥访问远程文件;使用权限控制模块验证用户对文件的访问权限,用户通过验证后才能访问文件;日志文件记录整个访问远程文件的过程。给出了网络文件锁、权限控制和日志模块的工作原理。 In order to solve the problem of access control in network file system for IMA system, we analyse access control and put forward a design scheme of access control. We use the Network File Lock to realize multiple partitions mutually exclusive access to remote files by locking files and unlocking files. We use the module of access control to authenticate the rights of the user. The user can access to files only if through verification. Log files save the whole operation process of accessing remote files. The paper draws principle of network file lock and purview control and modular of log.
出处 《航空计算技术》 2011年第5期95-97,109,共4页 Aeronautical Computing Technique
基金 航空科学基金项目资助(2006ZC31001)
关键词 IMA 网络文件系统 分区 权限控制 IMA network file system partition lock purview control
  • 相关文献

参考文献7

  • 1Rene L C. Eveleens, Integrated Modular Avionics Development Guidance And Certificate Considerations[ EB/OL]. http ://www. rto. nato. int ,2006.
  • 2Vincent C Hu, David F Ferraiolo, Rick D Kuhn. Assessment of Access Control Systems [ R]. USA: NISTIR7316, September 2006.
  • 3Riccardo Focardi, Roberto Gorrieri. Foundations of Security Analysis and Design: Tutorial Lecures [ M ]. Germany: Apringer,2001 : 137 - 196.
  • 4Ravi Sandhu, Pierangela Samarati. Access Control: Principles and Practice [ J ]. IEEE Communications Magazine, 1994,32 (9) :40 -48.
  • 5Sylvia Osborn, Ravi Sandhu, Qamar Mvnawer. Configuring Role - Based Access Control to Enforce Mandatory and Discretionary Access Control Policies [ J ]. ACM Transaction on Information and System Security,2000,3 ( 2 ) : 85 - 106.
  • 6刘建生,彭行顺.访问控制模型研究综述[J].计算机与数字工程,2010,38(7):115-119. 被引量:8
  • 7黄晖,王泉.航空软件配置管理系统设计和关键技术研究[J].航空计算技术,2010,40(4):69-71. 被引量:5

二级参考文献21

  • 1郭为,陈建明.软件配置管理服务模型研究[J].计算机工程与设计,2006,27(5):815-818. 被引量:1
  • 2林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 3Ian Sommerville著,程成译.软件工程(第6版)[M].北京:机械工业出版社,2003.
  • 4E W Myers.An O(ND) Difference Algorithm and its Variations[J].Algorithmica,1986,1(2):251-266.
  • 5E Ukkonen.Algorithms for Approximate String Matching[J].Information and Control,1985,64:100-118.
  • 6Ravi S.Sandhu,Edward J.Coyne,Hal L.Feinstein,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 7Ferraiolo D.F.,Sandhu R.,Gavrila S.,et al.Proposed NIST Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 8Xu Wei,Wei Jun,Liu Yu,et al.SOWAC:A Service-Oriented Workflow Access Control Model[C] //Proceedings of the 28th Annual International Computer Software and Applications Conference(COMPSAC'04),2004,1:128-134.
  • 9Rafael R.Obelheiro,Joni S.Fraga.Role-Based Access Control for CORBA Distributed Object Systems[C] //Proceedings of the Seventh International Workshop on Object-Oriented Real-Time Dependable Systems(WORDS 2002),2002:53-60.
  • 10Bo Lang,You Lu,Xin Zhang,et al.A Flexible Access Control Mechanism Supporting Large Scale Distributed Collaboration[C] //Proceedings of The 8th International Conference on Computer Supported Cooperative Work in Design,2004,1:500-504.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部