期刊文献+

应用UCON_(ABC)模型的个人信息保护方案

Research on Protection Scheme for Personal Information Based on UCON_(ABC) Model
下载PDF
导出
摘要 随着网络实名化程度的不断提高,个人信息安全问题日益突出。针对个人信息保护中的需求、权利和义务的动态性特征,传统的访问控制方法存在局限性,为此引入UCONABC模型的主要方法,通过细分个人信息资源使用控制中的主客体和权利,并基于授权、责任、义务等关键因素,设计了具有动态性特征的个人信息保护方案,为个人信息安全问题的解决提供了新思路。 With the continuous improvement of the degree of network real name, personal information security is becoming more and more prominent. In view of the dynamic nature of the requirements, rights and obligations in the protection of personal information, the traditional access control methods have limitations. A protection scheme with dynamic characteristics was designed by introducing the method of UCONABc model based on the division of the subject and the right of the personal information resources and the key factors, such as authorization, responsibility, obligation, etc, which provides new view for solving the problem of personal information security.
作者 李亚平
出处 《重庆理工大学学报(自然科学)》 CAS 2016年第4期102-107,共6页 Journal of Chongqing University of Technology:Natural Science
基金 国家社科基金资助项目(13BTQ048) 安徽省2013年高校省级优秀青年人才基金重点项目(2013SQRW115ZD)
关键词 UCON 个人信息 信息安全 动态性 usage control authorizations, obligations, conditions (UCON) personal information information security dynamic
  • 相关文献

参考文献8

二级参考文献51

  • 1梅绍祖,齐爱民.个人信息保护的基础性问题研究[J].苏州大学学报(哲学社会科学版),2005,21(2):25-30. 被引量:121
  • 2张志勇,普杰信,黄涛.UCOND:Usage Control委托模型及关键技术研究[J].网络安全技术与应用,2006(6):42-44. 被引量:7
  • 3中国互联网络信息中心.中国互联网络发展状况统计报告[R].北京:中国互联网络信息中心,2003..
  • 4[1]郝铁川.法治成本与人治成本[EB/OL].http://www.law-lib.com/lw/lw_view.asp?no=495,2007.
  • 5刘鹏.云计算-将计算变成水和电.中国计算机学会通讯,2009,(10):49-54.
  • 6Park J, Sandhu R. To-wards usage control models.. Beyond traditional access control[C]// Proceedings of 7th ACM symposium on Access control Models and Technologies. Monterey, USA.. ACM Press, 2002: 57-64.
  • 7王凤英.访问控制原理与实践[M].北京:北京邮电大学出版社,2010:112-120.
  • 8Barka E, Sandhu R. delegation models [ C]// Framework for role-based Proceedings of the 16th Annual Computer Security Applications Conference. New Orleans.. IEEE Computer Society, 2000 168-176.
  • 9Zhang L H, Ahn G J, Chu B T. A rule-based framework for role-based delegation and revocation[J].ACM Transactions on Information and System Security, 2003, 6(3): 404-441.
  • 10Zhang X W, OH S, Sandhu R. PBDM: A flexible delegation model in RBAC[C]//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. Como, Italy: ACM Press, 2003: 149-157.

共引文献265

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部