期刊文献+

带有委托功能的UCON_(preA)模型安全性分析及DBRM0表达

Safety analysis for UCON_(preA) model with delegation feature and expression for DBRM0
下载PDF
导出
摘要 针对使用控制模型(UCON)中加入委托功能后安全分析愈加复杂的问题,首先形式化地表达了其子模型——使用前授权(UCONpreA)的委托过程,通过分析证明了一般带有委托功能的UCONpreA模型的安全性是不可确定的,然后通过构造有限状态机的方法证明了一个受约束的带有委托功能的UCONpreA模型的安全性是可确定的,最后利用该约束模型成功地表达了传统的基于角色的委托模型(RBDM0);并进一步增强了UCON的表达能力,能有效保证其安全性。 In order to resolve the problem of safety analysis for Usage Control(UCON) with delegation feature,this article first formalized the delegation process for its one child model,pre-authorization model;the security of a general UCONpreA model with delegation feature was indefinite through analysis,by means of constructing a finite state machine,the security of a constrained UCONpreA model with delegation feature was proved decidable;lastly,the traditional role based on delegation model was simulated successfully using the constrained model.This research further enhances the expression power of UCON,and ensures its safety effectively.
出处 《计算机应用》 CSCD 北大核心 2012年第12期3426-3429,共4页 journal of Computer Applications
基金 国家科技支撑计划项目(2012BAH19F003)
关键词 使用控制 安全性分析 有限状态机 委托 基于角色的委托模型 Usage Control(UCON) safety analysis Finite State Machine(FSM) delegation RBDM0
  • 相关文献

参考文献10

  • 1PARK J, SANDHU R. The UCONABc usage control model [J].ACM Transactions on Information and System Security, 2004, 7 (1): 128 -174.
  • 2ZHANG X, PARK J, PARISI-PRESICCE F, et al. A logical speci- fication for usage control[ C]//Proceedings of the 9th ACM Sympo- sium on Access Control Models and Technologies. New York: ACM, 2004:1 - 10.
  • 3ZHANG XINWEN, SANDHU R, PRESICCE F P. Safety analysis of usage control authorization models [ C]// Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Se- curity. New York: ACM, 2006:243 -254.
  • 4FARZAD S, JASON F R, EDWARD D. An administrative model for UCON[ C]//Proceedings of the 8th Australasian Information Se- curity Conference. Queensland: Queensland University of Technolo- gy, 2010:32 - 38.
  • 5翟志刚,毛宇光,王建东.UCON_(onA)模型的安全研究[J].四川大学学报(工程科学版),2010,42(1):168-172. 被引量:1
  • 6李亚平,周伟良.UCON_(ABC)模型中的委托授权方案研究[J].中国科学技术大学学报,2012,42(2):154-160. 被引量:9
  • 7EHANG X, PARISI-PRESICCE F, $ANDHU R, et at: FOlVaal model and policy specification of usage control[ J]. ACM Transactions on In- formation and System Security, 2005, 8(4): 351 -387.
  • 8SIPSER M. Introduction to the theory of computation[ M]. Boston: PWS Publishing, 1997:35 -37.
  • 9BARKA E, SANDHU R. A role-based delegation model and some extensions[ C]/! Proceedings of the 23rd National Information Sys- tems Security Conference. New York: ACM, 2000:396 -404.
  • 10LI N, TRIPUNITARA M V. Security analysis in role-based access control[ J]. ACM Transactions on Information and System Security, 2006, 9(4) : 391 -420.

二级参考文献25

  • 1桂劲松,陈志刚,胡玉平,郭迎.服务网格中基于UCON_B的授权决策模型[J].四川大学学报(工程科学版),2008,40(6):133-139. 被引量:1
  • 2张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 3Bell D E, LaPadula L J. Secure computer systems : mathematical foundations and model[ M ]. Bedford, Mass : The MITRE Corp,1973.
  • 4Lunt T F, Denning D E, Schell R, et al. The seaview security model[J]. IEEE Transactions on Software Engineering, 1990,16(6) :593 -607.
  • 5Sandhu R, Chen F. The multilevel relational(MLR) data model[ J ]. ACM Transactions on Information and Systems Security, 1998,1 ( 1 ) :1-26.
  • 6Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models[J]. IEEE Computer,1996,29(2) :38 -47.
  • 7ANSI INCITS 359-2004. Standard for Role Based Access Control[ S]. USA: American National Standards Institute, 2004.
  • 8Park J, Sandhu R. The UCONABC usage control model[J]. ACM Transactions on Information and System Security, 2004,7(1) :128 -174.
  • 9Zhang Xinwen, Sandhu R, Presicce F P. Safety analysis of usage control authorization models [ C ]//Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. Taipei : ACM, 2006:243 - 254.
  • 10Pretschner A, Hilty M, Basin D. Distributed usage control [ J ]. Communications of the ACM,2006,49 (9) :39 - 44.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部