期刊文献+

CCERT信息服务的访问控制模型及其实现 被引量:2

Access Control Model of the Information Service of CCERT
下载PDF
导出
摘要 CCERT信息服务的访问控制模型是一种新型的基于属性证书的分布式系统的访问控制模型。文章在分析基于X.509公钥证书的访问控制模型的基础上,通过引入属性证书的概念,结合CCERT分布式信息服务系统的特点,给出了CCERT信息服务的访问控制模型以及该模型的具体实现。 : The access control model of the Information Service of CCERT is a new attribute certifictate based access control model of distributed system.Through the analyses of the access control model based on the X.509 public key certificateThis paper introduces an access control model based on the attribute certificate according to the features of CCERT.Meanwhile It illustrates the realization of the model.
作者 秦湘平 李星
出处 《计算机工程与应用》 CSCD 北大核心 2001年第6期54-56,87,共4页 Computer Engineering and Applications
关键词 信息服务 CCERT 网络安全 访问控制模型 计算机网络 : Attribute Certificate,Access Control,Distributed System
  • 相关文献

参考文献5

  • 1[1]Sandhu R S,Samarati P.Access control:Principles and Practice. IEEE Communications Magazine, 1994.9;32(9) :40-48
  • 2[2]James Davis,Dong Jacobson,Stephanie Bridges,et al. An Implementation of MLS on a network workstations using X.500/509.IEEE International Performance,Computing & Communications Conference,Proceedings,Feb 5-7,1997
  • 3[3]Dave Kosiur. LDAP:The next-generation directory?Sunworld,1996.10,http:.//www.sunworld.com/swol- 10-1996/swol-10-ldap.html
  • 4[4]R Housley SPYRUS,W Ford VeriSign,W Polk NIST,et al.1999. 1,http://www.ietf. org/rfc2459.txt
  • 5[5]ITU-T recommendation on X.509.1994.2,http://sirius.ac.upc.es/~jbt/learning/ x509/ITUx509/97x509final.html

同被引文献6

  • 1[1]http://www.ietf.org/rfc/rfc3281 .txt
  • 2[2]http:/java.sun.com/j2se/1.4.1/docs/guide/security/jsse/JSSERefGuide.html - Customization
  • 3Sandhu R, Coyne E J, Feinstein H L, et al. Role- based Access Control Models[J]. IEEE Computer,1996,29(2).
  • 4Jooh S. Park, Ravi Sandhu and Gall- Joon Alan[J ]. Role - Based Access Control on the Web ACM Transa- ctions on Information and System Security,2001,4( 1 ) : 37 - 71.
  • 5Rolf Oppliger , Giinther Pemul , Christine Strauss. Using Attribute Certificates to Implement Role - based Authorization and Access Controls.
  • 6张大江,钱华林.RBAC的数字证书实现方案[J].系统工程理论与实践,2002,22(4):63-68. 被引量:6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部