期刊文献+

基于角色和规则引擎的UCON应用模型 被引量:4

UCON application model based on role and rule-engine
下载PDF
导出
摘要 UCON是一种基于属性的下一代访问控制模型,但其高度抽象,难于直接应用,为此提出了一种基于角色和规则引擎的UCON应用模型UCON-ABRR。该模型通过引入角色这一属性,便于实现基于角色的用户管理;并基于规则引擎来制定访问规则和实施访问控制策略,不仅支持UCON的两个重要特征:属性易变性和决策过程连续性,而且具有很好的可操作性。该模型具有通用性,将其应用于云存储场景中,达到了预期的访问控制效果。 Attribute-based UCON is considered as the next generation access control model. But its highly abstraction makes it hard to be applied in real world systems directly. A UCON application model based on role and rule-engine, called UCON-ABRR is proposed. Role attribute is introduced to facilitate the management of role-based users and based on rule-engine the access rules is formulated and the control policy is realized, which not only supports the two important characteristics of UCON: attribute mutability and decision continuity, but also has good operability, The model is universal, and has achieved the expected access control effect when applied to the cloud storage scene.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第3期831-836,共6页 Computer Engineering and Design
基金 广东省自然科学基金项目(S2011010004197) 广东省教育部产学研合作基金项目(2011B090400331 2011B090400367)
关键词 访问控制 使用控制 应用模型 角色 规则引擎 云存储 access control UCON application model role rule-engine cloud storage
  • 相关文献

参考文献11

  • 1Park J, Sandhu R. Towards traditional access control [C] usage control models: Beyond //Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64.
  • 2Zhang X W, Park J, Sandhu R, et al. A logical specification for usage control [C] //Proceedings of the 9th ACM Symposi- um on Access Control Models and Technologies. New York: ACM, 2004: 1-10.
  • 3Salim F, Reid J, Dawson E. An administrative model for UCONABc [C] //Proceedings of the 8th Australasian Confe- rence on Information Security. Darlinghurst: Australian Com- puter Society, 2010: 32-38.
  • 4Zhang X W, Sandhu R, Presicce F P. Safety analysis of usage control authorization models [C] //Proceedings of the ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 243-254.
  • 5Rajkumar P V, Ghosh S K, Dasgupta P. An end to end correct- ness verification approach for application specific usage control [C] //Proceedings of the International Conference on Industrial and Information Systens Washington: IEEE, 2009: 1-6.
  • 6谢辉,张斌,任志宇.基于UCON模型的PMI体系结构[J].计算机工程与设计,2009,30(7):1590-1592. 被引量:2
  • 7Fang Zhihe, He Hongiun, Luo Li, et al. Application of UCON in SSL VPN system [C] //Proceedings of the Intema tional Conference on Progress in lnformatics and Computing. Washington: IEEE, 2010: 618-621.
  • 8Liu Chen, Dong Xupeng: Yang Zhengqiu. Research of modem enterprise intelligent system based on rule engine and workflow [C] //Proceedings of the International Conference on Intelli- gent Computing and Intelligent Systems. Washington: IEEE, 2010: 594-597.
  • 9Liu D, Gu T, Xue J P. Rule engine based on improvement rete algorithm [C] //Proceedings of the International Confe- rence on Appereeiving Computing and Intelligence Analysis. Was-hington: IEEE, 2010: 346-349.
  • 10JBoss Community. Drools website [EB/OL]. E2012-05-05]. http: //www. jboss, org/drools/downloads, html.

二级参考文献12

共引文献3

同被引文献36

  • 1袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148. 被引量:12
  • 2刘伟.Java规则引擎——Drools的介绍及应用[J].微计算机应用,2005,26(6):717-721. 被引量:37
  • 3JIN Xin,KRISHNAN R,SANDHU R.A unifed attribute-based access control model covering DAC MAC and RBAC[C]//Proc of the 26thIFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy.Berlin:Springer-Verlag,2012:41-55.
  • 4PRETSCHNER A,HILTY M,BASIN D,et al.Mechanisms for usage control[C]//Proc of ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2008:240-244.
  • 5CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Access control of cloud service based on UCON[C]//Proc of the 1st International Conference on Cloud Computing.Berlin:Springer-Verlag,2009:559-564.
  • 6FUCHS L,PERNUL G,SANDHU R.Roles in information security:a survey and classification of the research area[J].Computers and Security,2011,30(8):748-769.
  • 7KUHN D R,COYNE E J,WEIL T R.Adding attributes to role-based access control[J].Computer,2010,43(6):79-81.
  • 8HUANG Jing-wei,DAVID M N,BOBBA R,et al.A framework integrating attribute-based policies into RBAC[C]//Proc of the 17th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2012:187-196.
  • 9BASIN D,HARVAN M,KLAEDTKE F,et al.Monitoring usage-control policies in distributed systems[C]//Proc of the 18th International Symposium on Temporal Representation and Reasoning.Berlin:Springer-Verlag,2011:88-95.
  • 10JIANG Ze-tao,HU Shuo,GAN Sheng-ke,et al.Research on an UCON model supporting distributed management[C]//Proc of IEEE International Conference on Information and Automation.2008:1520-1524.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部