期刊文献+

基于访问控制的涉密信息管理安全解决方案 被引量:3

A Solution for Management Security of Secret Information Based on Access Controlling
下载PDF
导出
摘要 将涉密信息放入共享的数据库中保存必须解决其安全问题,访问控制是一种基本方法。文中首先分析了自主访问控制、强制访问控制、基于角色的访问控制这三种经典的访问控制模型,然后分析了涉密信息本身的特点及其操作管理的需求,并考虑了数据库应用程序中的主体、客体等因素,最后提出并设计了一个综合利用这些策略管理涉密信息的实现方案。该方案设计了几个数据库表,分别保存实现这三种访问控制模型所需的信息和各种类型的涉密信息,给出了这些信息之间的相互关系,划分了程序模块及其实现方案。该方案符合理论要求,切实可行。 Classified information to be included in the shared database must solve the security problem,access control is a kind of basic method. First,analyze the three classical access control models which are discretionary access control,mandatory access control and rolebased access control,then analyze the characteristics of secret information and the requirements of operational management,considering the subject,object and other factors in a database application. Finally,propose and design a realizing scheme which comprehensively uses these strategies to manage classified information in database applications. The scheme designs several database table which to save the information needed and various types of classified information to achieve these three access control model. The relationship between the information is presented,dividing the program module and its implementation scheme. The scheme is practicable.
作者 胡欣杰 路川
出处 《计算机技术与发展》 2014年第8期131-134,共4页 Computer Technology and Development
基金 军队预研项目(2008yy02001)
关键词 访问控制 数据库应用程序 信息安全 access control database applications program information security
  • 相关文献

参考文献12

  • 1PfleerCP.信息安全原理与应用[M].北京:电子工业出版社,2007.
  • 2路川.Oracle10g宝典[M].北京:电子工业出版社,2011.
  • 3WhittenJLJ系统分析与设计导论[M].北京:机械工程出版社,2012.
  • 4Yuan Changan, Tang Changjie, Wen Yuanguang, et al. Intelli- gent function model discovery system based upon gene expres- sion programming [ J ]. Journal of Computational Information Systems,2006,2 ( 4 ) : 1299-1304.
  • 5Lopes H S, Weinert W R. Egipsys : an enhance gene expression programming approach for symbolic regression problems [ J ]. International Journal of Applied Mathematics and Computer Science,2004,14 (3) :375-384.
  • 6Micali S. Simple and fast optimistic protocols for fair electronic exchange [ C ]//Proc of the twenty-second annum symposium on principles of distributed computing. New York, NY, USA : ACM ,2003 : 12-19.
  • 7李昕昕,严张凌,王赛兰.改进的基于角色的通用权限管理模型及其实现[J].计算机技术与发展,2012,22(3):240-244. 被引量:10
  • 8Pagnia H, Gartner C. On the impossibility of fair exchange without a trusted third party [ R ]. Darmstadt:Darmstadt Uni- versity of Technology, 1999.
  • 9季小明,汪家常.基于.NET动态用户权限管理模型的设计与实现[J].计算机技术与发展,2006,16(10):202-204. 被引量:10
  • 10林庆,王飞,吴旻,廖定安,王敏.基于专家系统的入侵检测系统的实现[J].微计算机信息,2007,23(03X):61-63. 被引量:7

二级参考文献37

共引文献26

同被引文献25

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部