期刊文献+

使用控制系统中的并发优先控制研究

Research on Concurrent Priority in Usage Control System
下载PDF
导出
摘要 使用控制有两个重要的特征:属性的可变性和访问决策的连续性,在多个主体同时访问客体并改变客体的属性时,为保证数据的一致性,要求同一时间只能有一个主体能够改变客体的属性,然而,当主体同时申请访问时存在优先权的问题。本文针对这一问题提出一种策略,使得在多个主体并发访问时,能够进行有依据的顺序访问,从而满足客户的需求。 There are two important characteristics in usage control: mutability of attributes and access decision continuity.In order to ensure data consistency,when a lot of subjects access to and change the attributes of one object at the same time,only one subject has the right to change the properties of the object.However,there is one problem exist,that is,who comes first as many subjects apply to change the properties of the object.Aiming at the question,the paper proposes a strategy,which brings sequential access when multiple subjects’concurrent access to object and it meets the needs of customers.
出处 《计算机与现代化》 2013年第7期59-61,共3页 Computer and Modernization
关键词 使用控制 优先级 并发访问 属性判断 UCON priority concurrent access attribute judgment
  • 相关文献

参考文献15

  • 1Jaehong Park, Ravi Sandhu. The UCONABC usage control model[J]. ACM Transactions on Information and System Security, 2004,7(1):128-174..
  • 2徐林鹏,李沛武,陈亮.基于使用控制日志属性的更新策略[J].能源研究与管理,2010(4):8-12. 被引量:2
  • 3李钢,李沛武,胡海霞.使用控制系统中属性更新的并发控制研究[J].南昌工程学院学报,2008,27(4):19-23. 被引量:2
  • 4张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 5Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, et al. A logical specification for usage control[C]// Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies. 2004:1-10..
  • 6Masakazu Soshi. Safety analysis of the dynamic-typed access matrix model[C]// Proceedings of the 6th European Symposium on Research in Computer Security. 2000:106-121..
  • 7Sylvia Osborn, Ravi Sandhu, Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transaction on Information and System Security, 2000,3(2):85-106.
  • 8Ahn G J, Mohan B, Hong S P. Towards secure information sharing using role-based delegation[J]. Journal of Network and Computer Applications, 2007,30(1):42-59..
  • 9Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control modeIs[J]. Computer, 1996,29(2):38-47..
  • 10Blaze M, Feigenbaum J, Ioannidis J, el a1. The role of trust management in distributed systems security[M]// Secure Internet Programming. 1999,1603:185-210..

二级参考文献9

  • 1赵宝献,秦小麟.数据库访问控制研究综述[J].计算机科学,2005,32(1):88-91. 被引量:17
  • 2袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148. 被引量:12
  • 3康松林,樊晓平,施荣华.网络应用软件监控系统管理信息存储优化设计[J].计算机工程与应用,2006,42(25):110-112. 被引量:1
  • 4Park J, Sandhu R. Towards usage control models:Beyond traditional access control[ J]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies ,2002:57- 64.
  • 5Park J, Sandhu R. The UCONABC usage control model[ J]. ACM Transactions on Information and Systems Security,2004,7 (1) :128 - 174.
  • 6Sandhu R, Park J. Usage control:A vision for next generation access control[J]. Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003:17 - 31.
  • 7Park J, Zhang Xinwen, Sandhu R. Attribute Mutability in Usage Control[ J]. Eighteenth Annual Conference on Data and Applications Security,2004:15 - 29.
  • 8Ramakrishnah R,Gehrke J.数据库管理系统:3版[M].周立柱,张志强,等,译.北京:清华大学出版社,2004:414.
  • 9李倩倩,于万钧,杨博,左国明,胡兆玮.基于数据仓库的工作流日志更新[J].计算机应用研究,2007,24(10):41-43. 被引量:2

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部