期刊文献+

电子文档多级访问控制方法研究 被引量:2

A Method of Access Control on Electronic Document Based on Multilevel Security
下载PDF
导出
摘要 电子文档给办公带来便捷的同时也存在相应的安全隐患,构建以密级划分的多级安全系统,对文档进行多级访问控制是解决电子文档安全的有效方法。本文在研究基于中国剩余定理的多级密钥管理方法基础上,给出了一种电子文档多级访问控制方法,并对该方法的动态性、安全性和实用性进行了分析,最后给出了一个电子文档多级访问控制系统的基本框架。 Besides the convenience it brings to office, Electronic documents also have some security risks. Building a muhilevel security system which divided by secret level identification and make a document~ mul- tilevel access control is an effective way for solving the electronic document~ security problems. After the re- search of management of multilevel key based on Chinese Remainder Theorem, this paper not only presents a method about electronic document~ multilevel access control, but also gives an analysis of the dynamic na- ture, safety and practicality. Eventually, the paper designs a basic framework for electronic document~ mul- tilevel access control system.
出处 《北京电子科技学院学报》 2012年第2期9-14,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 中国剩余定理 MLS 电子文档 访问控制 Chinese remainder theorem ML electronic document access control
  • 相关文献

参考文献7

二级参考文献37

  • 1李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 2高磊,詹毅.基于角色的多级文档安全访问控制模型设计[J].计算机仿真,2005,22(2):70-73. 被引量:4
  • 3高扬,张家钰,吴敏.利用RBAC实现对XML文档的安全访问控制[J].微机发展,2005,15(4):98-101. 被引量:2
  • 4李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 51,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 62,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 73,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 84,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 95,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 10[1]L.harn,H.Y.Lin.A cryptographic keys generation scheme for multilevel data security [J].Computer security,1990,9:539-546.

共引文献83

同被引文献10

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部