期刊文献+

浅析电气自动化中网络访问的控制技术 被引量:1

下载PDF
导出
摘要 随着科学技术的不断进步,计算机技术在各个行业中的运用更加普遍。作为计算机应用技术的代表,网络访问控制技术是保证信息安全的常用方式。基于此,本文主要对电气自动化网络访问控制技术进行了探讨。
作者 刘静远
出处 《科技资讯》 2012年第3期29-29,共1页 Science & Technology Information
  • 相关文献

参考文献2

二级参考文献10

  • 1MARTIN E. Automated test generation for access control policies [ C ]//Proc of Conference on Object-Oriented Programming Systems, Languages, and Applications. New York: Association for Computing Machinery, 2006:752-753.
  • 2FISLER K, KRISHNAMURTHI S, MEYEROVICH L A, et al. Verification and change-impact analysis of access-control policies [ C ]// Proc of the 27th International Conference on Software Engineering. New York : Association for Computing Machinery, 2005:96-205.
  • 3KNORR K. Dynamic access control through Petri net workflows [ C]//Proc of the 16th Annual Computer Security Applications Conference. New York : IEEE Computer Society,2000 : 159-167.
  • 4KNORR K. Multilevel security and information flow in Petri net workflows[ C]//Proc of the 9th International Conference on Telecommunication Systems-Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems. 2001:9-20.
  • 5JIANG Yi-xin, LIN Chuang, YIN Hao, et al. Security analysis of mandatory access control model [ C ]//Proc of IEEE International Conference on Systems, Man and Cybernetics. New York: Institute of Electrical and Electronics Engineers Ine, 2004: 5013-5018.
  • 6ZHANG N, RYAN M, GUELEV D P. Evaluating access control policies through model checking[ C]//Proc of the 8th Information Security Conference. Berlin : Springer-Verlag,2005:446- 460.
  • 7SCHAAD A, LOTZ V, SOHR K. A model checking approach to analysis organizational controls[ C]//Proc of the 11 th ACM Symposium on Access Control Models and Technologies. New York: Associa- tion for Computing Machinery,2006 : 139-149.
  • 8SCHAAD A, MOFFETT J. A lightweight approach to specification and analysis of role-based access control extensions [ C]//Proc of ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, 2002: 13-22.
  • 9洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 10严悍,张宏,许满武.基于角色访问控制对象建模及实现[J].计算机学报,2000,23(10):1064-1071. 被引量:58

共引文献76

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部