期刊文献+

权限动态调整的云计算访问控制模型研究

Research on a Cloud Computing Access Control Model with Dynamic Security Level Adjustment
下载PDF
导出
摘要 针对基于云计算的应用系统中合法用户可能进行非法操作的不可控问题,提出一种权限动态调整的访问控制模型VLOSRBAC。该模型在RBAC基础上,为主体和客体增加了安全等级属性,主体能否访问客体与主体具有的权限和安全等级有关,同时主体的安全等级值与主体访问行为密切相关,若主体进行了非法操作则系统自动降低其安全等级,从而可使主体虽然具有访问客体的权限但是无法访问相关客体。实验结果表明,利用该模型进行访问控制,能较好的阻止主体的非法访问,对于主体的行为能进行较好的管控,有效了保护了数据与资源的安全。 For legitimate users of cloud computing apphcation system may be illegal operation of uncontrollable problem based on dynamic adjustment of rights, put forward a kind of access control model VLOSRBAC. The model on the basis of RBAC, increase the level of security attributes for the subject and the object, the subject can access permissions and security level of the object and subject of the level of security at the same time, the main value is closely related with the subject access behavior, if the subject of illegal operation automatically reduce the security system, so that the body is to access the object permissions but cannot access the relevant object. The experimental results show that, by using the model of access control, illegal access to better prevent the subject, for the behavior of the main body for better control, effectively protect the data and resources security.
作者 黄毅 朱爱梅
出处 《数字技术与应用》 2015年第6期174-176,178,共4页 Digital Technology & Application
关键词 云计算 访问控制 安全等级 信用等级 信用等级评估 Cloud computing access control security credit credit rating
  • 相关文献

参考文献9

二级参考文献56

  • 1赵玉霞.基于SaaS模式下的系统数据安全策略研究[J].软件导刊,2010,9(1):143-144. 被引量:5
  • 2梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 3张学敏,熊曾刚,陈建新,刘洪星.基于MIS系统的用户动态权限管理[J].计算机工程,2005,31(6):231-232. 被引量:10
  • 4李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 5Fcrraiolo D F,Barkley J F,Kubn D R.A role based access con- trol model and reference implementation within a corporate in- tranet[J].ACM Transactions on Information Systems Security, 1999, 2 ( 1 ) : 34-64.
  • 6Sandhu, R, Samarati P.Access control:principles and practice[J].IEEE Commun, 1994,32(9) :40-48.
  • 7Nyanchama M, Osbom S.Modeling mandatory access control in role-based security systems[C]//Proeeedings of the 9th Annual IFIP TC11 WG11.3 Working Conference on Database Security IX: Status and Prospects, RensselaerviUe, New York, United States, 1996:129-144.
  • 8Ferraiolo D F,Ktthn D R.Role based access control[C]//15th National Computer Security Conference, 1992: 554-563.
  • 9Sandhu R S,Coyne E J.Role-based access control models[J].Compurer, 1996,29(2) :38-47.
  • 10Alto G J, Sandhu R.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security, 2000,3 (4) : 207-226.

共引文献155

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部