期刊文献+

动态授权策略修正研究

Amendment of dynamic authority policy
原文传递
导出
摘要 针对动态授权策略生成时存在误差的问题,提出利用信用卡规则引入修正因子参数,对授权策略进行修正,并给出了修正因子表达式.在将顺序、循环、并发、选择4种基本服务关系序列化后,可建立有序服务队列,进而基于有序服务队列给出授权策略修正表达式,提高动态授权策略准确性.通过实验对策略修正表达式进行验证,表明修正因子可以根据历史信用记录调整授权策略. There may being some errors in dynamic authority policy,a modification factor was designed to improve the accuracy of authority policy by using the credit card rule.After serializing the four relationship types of service,sequence,switch,while and flow,an ordered service sequence was built.By adding to the amendment factor,the modification formula on ordered service sequence was given.The authority accuracy was improved using the modification formula.The experiment results show the modification factor can adjust the policy better.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期5-7,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 信息安全 访问控制 授权 策略修正 服务队列 information security access control authority policy modification service sequence
  • 相关文献

参考文献4

二级参考文献45

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 3Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 4Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 5Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 6Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 7Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 8Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 9Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf
  • 10Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models. IEEE Computer, 1996,29(2):38-47.

共引文献296

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部