期刊文献+

状态控制安全策略研究

Research on security policy about state control
下载PDF
导出
摘要 从讨论当前流行的访问控制策略的安全缺陷,及其与状态控制策略的互补性和完备性特征入手,分析了研究状态控制策略的必要性;定义了状态控制安全策略描述形式,并以XML语言为基础,制定策略描述基本规则;同时,按控制目标和控制对象的不同,给出了状态控制策略应用模式;此外,分析了状态控制策略的复杂性问题,并给出初步的解决思路。 By discussing the shortages of access control policy, and analyzing the complementarity and completeness between access control and state control, the necessity of state control was proposed. A formal description about state control policy was defined, and the policy's description rules based on XML were regulated. At the same time, according to different control goal and control object, some application patterns for state control policy were provided. In addition, the complexity of state control policy was discussed, and some solutions were provided.
出处 《计算机应用》 CSCD 北大核心 2012年第5期1375-1378,1384,共5页 journal of Computer Applications
基金 国家973计划项目(2011CB302301) 国防信息学院重点预研项目(ZXKT-KJ-1113)
关键词 状态控制 安全策略 形式描述 应用模式 复杂性分析 state control security policy formal description application pattern complexity analysis
  • 相关文献

参考文献10

  • 1DAMIANOU N,DULAY N,LUPU E C. The ponder policy specification language[A].LONDON:SPRINGER-VERLAG,2001.1-11.
  • 2LALANA K. Rei:A policy specification language[OL].http://rei.umbc.edu/,2011.
  • 3DELLA-LIBERA G,HALLAM-BAKER P. Web services security policy language[EB/OL].http://en.wikipedia.org/wiki/ws-SecurityPolicy,2011.
  • 4MOSES T. Extensible access control markup language (XACML)version 3.0[EB/OL].http://www.oasis-open.org/committees/tc_home.php,2011.
  • 5IETF Policy Working Group. Policy framework[EB/OL].http://www.ietf.org/html.charters/policy-charter.html,2011.
  • 6谷千军,王越.BLP模型的安全性分析与研究[J].计算机工程,2006,32(22):157-158. 被引量:16
  • 7陈晓苏,匡硕,吴永英,林植.基于XML的安全策略描述语言规范[J].华中科技大学学报(自然科学版),2008,36(6):28-32. 被引量:4
  • 8WANG JING,LIN ZHI. An XML-based description method of security policy[A].Washington,DC:IEEE Computer Society,2010.391-396.
  • 9杜红燕,潘怡,黄彩霞,欧新良.OC-RBAC模型在管理信息系统中的应用[J].华中科技大学学报(自然科学版),2009,37(9):53-55. 被引量:2
  • 10LIN ZHI,WANG JING,JIA LIAN-XING. Policy-based behavior control[A].Washington,DC:IEEE Computer Society,2009.365-370.

二级参考文献23

  • 1陈旺,李中学.BLP模型及其研究方向[J].计算机工程与应用,2006,42(13):136-138. 被引量:6
  • 2张野,方勇,吕伟,石稀林,邓远林.一种基于对象组的RBAC权限模型[J].信息与电子工程,2007,5(2):138-141. 被引量:3
  • 3吴春雷,张学辉.一种基于RBAC扩展模型的Web系统权限控制方法[J].科学技术与工程,2007,7(11):2672-2676. 被引量:4
  • 4Ferraiolo D F, Sandhu R S, Gavrila S, et al. Proposed NIST standard for role-based access control [J]. ACM Transactions on Inforation and Systems Security (TISSEC), 2001, 4(3): 224-274.
  • 5Sandhu R,Coyne E J. Role-based access control models[J]. IEEE Computer, 1996,29(2) :38-47.
  • 6Ferraiolo D F, Kuhn D R. Role-based access control [M]. Artech House Inc, 2003.
  • 7Sandhu R, Bhamidipati V. The ARBAC97 model for rolebased administration of roles: preliminary description and outline[C]//Proceedings of the 2th ACM Workshop on Role-based Access Control. Fairfax:[s. n. ], 1997:321-332.
  • 8Sandhu R, Coyne E J. Role-based access control: a multi-dimensional view[C]//Proceedings of the 10th Annual Computer Security Application Conference. Orlando: IEEE Press, 1994: 534-543.
  • 9Sandhu R. Role-based access control Laboratory for Information Security Technology[D]. George: ISSE Department, George Mason University, 1997.
  • 10Bell D E, Leonard J L. Secure Computer System: Unified Exposition and MULTICS Interpretation[R], Bedford, MA, USA: The Mitre Corporation, Tech. Rep.: MTR-2997, 1976.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部