期刊文献+

基于访问控制的隐私保护方法的研究 被引量:2

Research of privacy protection method based on access control
下载PDF
导出
摘要 为保护移动终端中实时上传的位置信息,提出了一种基于分级角色的访问控制方法.该方法对访问者进行二级角色定义,并根据访问者的不同角色定义不同的访问权限来保护位置信息.对该访问控制方法进行了模型构建,同时在移动终端内进行了可行性测试.实验结果表明,该访问控制方法能较好地保护实时上传的位置信息,且具有应用可行性. According to protect the position information of mobile terminal in real time to upload,this paper proposes a multi-level access control method based on role.We define the secondary role for the visitor and different access rights to protect the position information of mobile terminal in real time to upload according to the different role of visitors.A new model based on hierarchical role access control method is builded,at the same time a feasibility test in the mobile terminal is carry out.Results of experiments indicated that the new multilevel access control method based on role can protect upload real-time location information better and make application feasible.
作者 苏晴 李永珍
出处 《延边大学学报(自然科学版)》 CAS 2016年第1期69-74,共6页 Journal of Yanbian University(Natural Science Edition)
关键词 移动终端 角色分级 访问控制 位置信息 可行性 mobile terminal role classfication access control location information feasibility
  • 相关文献

参考文献6

二级参考文献28

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 3张野,方勇,吕伟,石稀林,邓远林.一种基于对象组的RBAC权限模型[J].信息与电子工程,2007,5(2):138-141. 被引量:3
  • 4陈明忠.基于角色访问控制模型的应用研究[J].天津工程师范学院学报,2007,17(2):35-37. 被引量:3
  • 5MOFFETY J D. Control Principles and Role Hierarchies[ C ]. Proceedings of the 3rd ACM Workshop on Role - Based Access Control ( RBAC'98). 1998 : 91 - 101.
  • 6SEJONG OH, RAVI SANDHU. A Model for Role Administration Using Organization Structure [ C ]. The 7th ACM Symp on Access Control Models and Technologies ( SACMAT 2002) , Monterey, California, 2002.
  • 7JOSHI J B D, BERTINO E, LATIF U, et al. A Generalized Temporal Role- Based Access Control Model[J]. IEEE Trans on Knowledge and Data Engineering, 2005, 17 ( 1 ) : 4 - 23.
  • 8BHATrI R,JOSHI J, BERTINO E, et al. Access Control in Dynamic XML - Based Web - Services with X - RBAC[ C]. Proceeding of the First International Conference on Web Services, Las Vegas : CSREA Press, 2003 : 23 - 26.
  • 9PARK J, SANDHU R,AHN G. Role - Based Access Control on the Web [ J ]. ACM Transaction on Information and System Security, 2001, 4(1): 37-71.
  • 10Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models[J]. IEEE computer, 1996,29 (2) : 38-47.

共引文献69

同被引文献11

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部