期刊文献+

基于XACML实现量化风险自适应的访问控制 被引量:1

XACML-BASED IMPLEMENTATION OF QUANTIFIED RISK ADAPTIVE ACCESS CONTROL
下载PDF
导出
摘要 量化风险自适应的访问控制是现在系统安全领域的一个研究热点,但XACML(eXtendab le Access Control Markup Lan-guage)的实现未考虑量化风险自适应访问控制机制。在XACML的基础上,充分利用其强大的访问策略表达能力,在不改变访问请求语义的情况下加入了量化风险的控制功能,并扩展XACML框架,添加持续的访问控制风险管理机制,实现了量化风险自适应的访问控制。 Quantified risk adaptive access control is a focus of research in the field of system information security at present.But the implementations of XACML have not considered the mechanism of quantified risk adaptive access control.Based on the investigation of XACML,we make full use of its great expressing ability in access control policy to add control functions of quantified risk to the system without changing the semantics of access request.And the framework of XACML has also been extended to implement the quantified risk adaptive access control by adding durative risk management mechanism of access control.
作者 郑琪
出处 《计算机应用与软件》 CSCD 北大核心 2012年第2期285-288,293,共5页 Computer Applications and Software
关键词 可扩展的访问控制标记语言 量化风险 风险管理 eXtendable Access Control Markup Language(XACML) Quantified risk Risk management
  • 相关文献

参考文献6

  • 1Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser. Fuzzy MLS: An Experiment on Quantified Risk-Adaptive Access Control [ C ]//Berke- ley, CA: IEEE Symposium on Security and Privacy, 2007:222 -230.
  • 2Weili Han, Qun Ni, Hong Chen. Apply Measurable Risk to Strengthen Security of a Role-based Delegation supporting Workflow System [ C ]// London, UK: IEEE International Symposium on Policies for Distribu- ted Systems and Networks( POLICY 2009 ) ,2009:45 - 52.
  • 3MITRE Corporation Jason Prograrm Office. HORIZONTAL INTEGRA- TION: Broader Access Models for Realizing Information Dominance [OL]. JSR - 04 - 132, December 2004. http://www, fas. org/irp/ agency/dod/jason/classpol, pdf.
  • 4OASIS eXtensible Access Control Markup Language (XACML) Ver- sion 2.0 [ EB/OL ], (2005 -02 -01 ). http://docs, oasis-open, org/ xacml/2.0/access control-xaml-2.0-core-spec-os, pdf.
  • 5Weili Han, Min Xu, Weidong Zhao, et al. A trusted decentralized ac- cess control framework for the client/server architecture [ J ]. Journal of Network and Computer Applications, 2010,33 (2) :76 - 83.
  • 6Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi. Trading in Risk: Using Markets to Improve Access Control [ C ]//Lake Tahoe, California, USA:Proceedings of the 2008 Workshop on New Security Paradigms ( NSPW' 08 ) ,2008.

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部