期刊文献+

基于角色-任务-产品的企业知识访问控制模型

Enterprise Knowledge Access Control Model Based on Role-Task-Product
原文传递
导出
摘要 传统的计算机访问控制模型很难适应动态、异构的网络环境下企业知识访问控制。根据企业知识特征,提出一种基于角色-任务-产品的企业知识访问控制模型,并构建角色、任务和产品的本体作为模型逻辑推理基础,然后以汽车虚拟企业为例演示该模型的工作机制和过程,显示该模型能有效适应动态、异构的网络环境。 Traditional access control model of computer system is difficult to be adapted to enterprise knowledge access con-trol in dynamic,heterogeneous network environment.According to characters of enterprise knowledge,a role-task-product based enterprise knowledge access control model is presented,with ontology of role,task and product described which is log-ic engine of the model.Then a case of auto virtual enterprise is demonstrated,proving that the model is qualified for dynam-ic,heterogeneous network environment.
作者 詹川
出处 《世界科技研究与发展》 CSCD 2014年第3期257-262,共6页 World Sci-Tech R&D
基金 重庆市科委自然科学基金计划(CSTC.2010BB2262) 电子商务及供应链系统重庆市重点实验室开放基金(2012ECSC0102)资助
关键词 知识管理 角色-任务-产品 本体 访问控制 knowledge management role-task-product ontology access control
  • 相关文献

参考文献11

  • 1齐二石,刘传铭,王玲,霍艳芳.虚拟企业知识管理系统架构研究[J].图书情报知识,2004,21(1):22-24. 被引量:11
  • 2齐二石,郑晓东,郑轶松,李钢.基于Web的虚拟企业知识管理系统研究[J].工业工程,2006,9(1):70-74. 被引量:24
  • 3ANGEL,JUAN M, RICARDO G. Securontology:A semantic web ac- cess control framework [ J ]. Computer Standards & Interfaces, 2011, 33( 1 ) :42-49.
  • 4CHEN Tsungyi, CHEN Yuhmin, CHU Huichuan. Development of an Access Control Model,System Architecture and Approaches for Infor- mation Sharing in Virtual Enterprise [ J ]. Computers in Industry, 2007,58( 1 ) :57-73.
  • 5SINGH R, SALAM A F. Semantic Information Assurance for Secure Distributed Knowledge Management: a Business Process Perspective [ J]. IEEE Transactions on Systems, Man and Cybernetics-Part A: Systems and Humans,2006,36 ( 3 ) :472-486.
  • 6郭建文,于德介,刘坚,曾威.面向设备维护联盟的知识安全管理研究[J].中国机械工程,2010,21(6):672-679. 被引量:2
  • 7沈海波.基于语义的访问控制模型及其推理机制[J].计算机工程,2010,36(3):162-163. 被引量:5
  • 8YAO Zhilin LI Bing LIU Shufen.Role Based Collaboration Authorizing by Using Ontology[J].Chinese Journal of Electronics,2011,20(3):389-394. 被引量:5
  • 9BACON J, MOODY K, YAO W. A Model of OASIS Role-based Ac- cess Control and Its Support for Active Security [ J ]. ACM Transac- tions on Information and System Security,2002,5 (4) :492-540.
  • 10FERRAIOLO D F, SANDHU R, GAVRILA S, et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security ,2001,5(3) :224-274.

二级参考文献37

  • 1周和荣,李海婴.敏捷企业知识管理的动因与机理探讨[J].科技进步与对策,2004,21(6):19-21. 被引量:5
  • 2刘坚,于德介,李德刚,邓乾旺.面向设备e-维护的联盟框架研究[J].计算机集成制造系统,2005,11(1):145-150. 被引量:4
  • 3李德刚,于德介,刘坚,舒浩华.基于Agent的组织建模研究[J].中国管理科学,2005,13(6):136-142. 被引量:10
  • 4潘旭伟,顾新建,程耀东,李建明.集成情境的知识管理模型[J].计算机集成制造系统,2006,12(2):225-230. 被引量:37
  • 5Bonatti P A, Duma C, Fuchs N, ct al. Semantic Web Policies A Discussion of Requirements and Research Issues[C]//Proc. of the European Semantic Web Conference. [S. l.]: Springer, 2006.
  • 6Yague M, Mana A, Lopez J. Applying the Semantic Web Layers to Access Control[C]//Proc. of the 14th IEEE International Workshop on Database and Expert Systems Application. Valencia, Spain: IEEE Computer Society, 2003: 622-626.
  • 7Li Qin,Vijayalakshmi A. Concept-level Access Control for the Semantic Web[C]//Proc. of the 2003 ACM Workshop on XML Security. [S. l.]: ACM Press, 2003.
  • 8Javanmardi S, Amini A, Jalili R. An Access Control Model for Protecting Semantic Web Resources[C]//Proceedings of the 2nd International Semantic Web Policy Workshop. Athens, Greek: IEEE Press, 2006.
  • 9Heflin J. OWL Web Ontology Language Use Cases and Requirements[EB/OL]. (2004-02-10). http://www.w3.org/TR/web ont-req/.
  • 10Submission W. Semantic Web Rule Language(SWRL)[EB/OL]. (2004-03-23). http://www.w3.org/Submission/.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部