期刊文献+

UCON_(ABC)模型中的委托授权方案研究 被引量:9

Research on the delegation schemes of the UCON_(ABC) model
下载PDF
导出
摘要 在使用控制(usage control,UCON)核心模型UCONABC(usage control authorizations,obligations,conditions)中引入委托机制,对委托的粒度、深度、广度以及授权回收等问题进行研究,并通过划分主体属性,建立属性与权利的对应关系等方式,设计了新的带有委托授权特征的UCONABC模型,并给出两个具有委托授权特征的UCONABC子模型的形式化描述,最后,通过委托授权模型在数字资源访问控制中的一个应用实例,验证带有委托授权特征的UCONABC模型的有效性,并以此体现对于开放式环境中基于属主的委托授权问题的研究意义. After the mechanism of delegation was introduced to the usage control authorizations,obligations,conditions(UCONABC) model,the problems of the delegation were studied in granularity,depth,breadth and authorization recycling.Moreover,according to the subject attribute,the modes of the relationship between attributes and rights were established and a new UCONABC model was designed with the characteristic of delegation.And the formal descriptions of two sub-model for UCONABC with the characteristic of delegation were given.Finally,the effectiveness of the new model was proved by its application in digital resource access control,which reflected the importance of the management of delegation based on the owner in the open system environment(OSE).
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2012年第2期154-160,共7页 JUSTC
基金 安徽省高校自然科学研究项目(KJ2011Z063)资助
关键词 使用控制 委托授权 属性 授权回收 开放式环境 usage control delegation attribute authorization recycling open system environment
  • 相关文献

参考文献13

  • 1张维勇,梅勃,聂丽平.基于使用控制模型的数字版权管理应用研究[J].合肥工业大学学报(自然科学版),2008,31(2):175-178. 被引量:4
  • 2Park J, Sandhu R. To-wards usage control models.. Beyond traditional access control[C]// Proceedings of 7th ACM symposium on Access control Models and Technologies. Monterey, USA.. ACM Press, 2002: 57-64.
  • 3王凤英.访问控制原理与实践[M].北京:北京邮电大学出版社,2010:112-120.
  • 4Barka E, Sandhu R. delegation models [ C]// Framework for role-based Proceedings of the 16th Annual Computer Security Applications Conference. New Orleans.. IEEE Computer Society, 2000 168-176.
  • 5Zhang L H, Ahn G J, Chu B T. A rule-based framework for role-based delegation and revocation[J].ACM Transactions on Information and System Security, 2003, 6(3): 404-441.
  • 6Zhang X W, OH S, Sandhu R. PBDM: A flexible delegation model in RBAC[C]//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. Como, Italy: ACM Press, 2003: 149-157.
  • 7Cramption J, Khambhammettu H. Delegation in role based access control [J].International Journal of Information Security, 2008, 7(2):123-136.
  • 8Zhang X W, Nakae, M, Covington M J, et al. A usage-based authorization framework for collaborative computing systems [C] // Proceedings of ACM Symposium on Access Control Models and Technologies. Lake Tahoe, USA: ACM Press, 2006, (6) :180-189.
  • 9张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 10周丽丽,王凤英,王洪福.基于UCON和动态模糊神经网络的委托授权模型[J].山东理工大学学报(自然科学版),2010,24(1):22-26. 被引量:3

二级参考文献57

共引文献26

同被引文献53

  • 1齐爱民.论个人信息保护基本策略的政府选择[J].苏州大学学报(哲学社会科学版),2007,23(4):32-36. 被引量:9
  • 2张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 3李敏,刘胜利,陈克非.家庭网络DRM与典型DRM整合问题的研究[J].计算机工程,2007,33(2):249-251. 被引量:6
  • 4PARK J, SANDHU R. The UCONABc usage control model [J].ACM Transactions on Information and System Security, 2004, 7 (1): 128 -174.
  • 5ZHANG X, PARK J, PARISI-PRESICCE F, et al. A logical speci- fication for usage control[ C]//Proceedings of the 9th ACM Sympo- sium on Access Control Models and Technologies. New York: ACM, 2004:1 - 10.
  • 6ZHANG XINWEN, SANDHU R, PRESICCE F P. Safety analysis of usage control authorization models [ C]// Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Se- curity. New York: ACM, 2006:243 -254.
  • 7FARZAD S, JASON F R, EDWARD D. An administrative model for UCON[ C]//Proceedings of the 8th Australasian Information Se- curity Conference. Queensland: Queensland University of Technolo- gy, 2010:32 - 38.
  • 8EHANG X, PARISI-PRESICCE F, $ANDHU R, et at: FOlVaal model and policy specification of usage control[ J]. ACM Transactions on In- formation and System Security, 2005, 8(4): 351 -387.
  • 9SIPSER M. Introduction to the theory of computation[ M]. Boston: PWS Publishing, 1997:35 -37.
  • 10BARKA E, SANDHU R. A role-based delegation model and some extensions[ C]/! Proceedings of the 23rd National Information Sys- tems Security Conference. New York: ACM, 2000:396 -404.

引证文献9

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部