期刊文献+

一种多级跨域访问控制管理模型 被引量:4

A Multi-Level & Inter-Domain Access Control Administrative Model
下载PDF
导出
摘要 访问控制管理为维护访问控制策略的安全、一致提供了重要保障。针对现有访问控制管理模型存在指派关系复杂、扩展性差、缺乏对跨域访问管理有效支撑的问题,结合多级跨域系统特性和访问控制管理的细粒度要求,文章提出了多级跨域访问控制管理模型,给出了模型的基本元素、元素关系、约束条件和管理规则。与现有研究相比,该模型具有良好的可扩展性,支持细粒度的管理操作,能够有效支撑多级跨域环境下安全、统一的访问控制管理。 The technologies of access control administration provide security and consistency to access control policies. Aiming at the problems of complex assignment, scalability and lacking of effective support for cross-domain access management of exsisting models, this paper proposes a multi-level&inter-domain access control administrative model (ML-IDACAM) by combining the characteristics of multi-level&inter-domain system and the ifne-grained need of access control administration, bringing forward the model’s basic elements, element relationships, constraints and administration rules. Compared with related works, the ML-IDACAM model which has good expansibility and ifne-grained operation can support secure and centralized access control administration.
出处 《信息网络安全》 2014年第2期1-6,共6页 Netinfo Security
基金 国家"973"重点基础研究发展计划[2011CB311801] 国家"863"高技术研究发展计划[2012AA012704]
关键词 多级跨域 访问控制管理 细程度 multi-level and inter-domain access control administration ifne-gramed
  • 相关文献

参考文献16

二级参考文献246

共引文献225

同被引文献83

  • 1康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 2MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 3ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 4KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 5PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 6NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 7XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between Guest OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 8WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 9Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.
  • 10TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172.

引证文献4

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部