关联数据的访问控制技术进展探究
摘要
在现代社会中的关联数据环境下,访问控制技术是一类对敏感数据进行保护的主要技术,具有较大的应用价值。本文主要对访问控制的相关方法以及比较常用的策略语言进行概述,并提出了几种改进方法,以期能够提供一定的参考。
出处
《北京印刷学院学报》
2020年第7期154-156,共3页
Journal of Beijing Institute of Graphic Communication
参考文献4
-
1褚含冰.云计算访问控制技术研究综述[J].赤峰学院学报(自然科学版),2019,35(10):38-40. 被引量:3
-
2谢绒娜,郭云川,李凤华,史国振,王亚琼,耿魁.面向数据跨域流转的延伸访问控制机制[J].通信学报,2019,40(7):67-76. 被引量:6
-
3刘振.关联数据的访问控制技术进展研究[J].情报理论与实践,2014,37(12):127-132. 被引量:1
-
4王静宇,高宇.基于随机策略更新的大数据访问控制方案[J].内蒙古科技大学学报,2019,38(3):258-264. 被引量:1
二级参考文献29
-
1HOLLENBACH J, PRESBREY J, BERNERS-LEE T. Using rdf metadata to enable access control on the social semantic Web [ C ] //Proceedings of the Workshop on Collaborative Construc- tion, Management and Linking of Structured Knowledge (CK2009) . 2009: 514.
-
2BIZER C, CARROLL J J. Modelling context using named graphs [ C ] //W3C Semantic Web Interest Group Meeting, 2004.
-
3KIRRANE S, LOPES N, MILEO A, et al. Protect your RDF Datal [M] //Semantic Technology. [S. 1. ]: Springer Ber- lin Heidelberg, 2013 : 81-96.
-
4USZOK A, BRADSHAW J, JEFFERS R, et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement [ C] // Policies for distributed systems and networks, 2003.Proceed- ings. POLICY 2003. IEEE 4tb International Workshop on. IEEE, 2003: 93-96.
-
5DAMIANOU N, DULAY N, LUPU E, et al. The ponder poli- cy specification language [ M ] //Policies for Distributed Sys- tems and Networks. [ S. 1. ]: Springer Berlin Heidelberg, 2001 : 18-38.
-
6KAGAL L, FININ T, JOSHI A. A policy language for a perva- sive computing environment [ C ] //Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on. IEEE,2003:63-74.
-
7BONATI?I P A, DE COI J L, OLMEDILLA D, et al. Rule- based policy representations and reasoning [ M ] //Semantic Techniques for the Web. [ S. 1. ] : Springer Berlin Heidelberg, 2009 : 201-232.
-
8MUHLEISEN H, KOST M, FREYTAG J C. SWRL-based ac- cess policies for linked data [ C ] //SPOT 2010 2nd Workshop on Trust and Privacy on the Social and Semantic Web, Herak- lion, Greece. 2010.
-
9NERI M A, GUARNIERI M, MAGRI E, et al. Conflict detec- tion in security policies using semantic web technology [ C ] // Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European Conference on. IEEE, 2012: 1-6.
-
10RECORDON D, REED D. OpenID 2.0 : a platform for user- centric identity management [ C ] //Proceedings of the Second ACM Workshop on Digital identity Management. ACM, 2006:11-16.
共引文献7
-
1田若朝.巧用动态访问控制 灵活管理访问权限[J].通讯世界,2020,27(1):123-124.
-
2李震.计算机图形技术在数据计算方面的应用[J].数字技术与应用,2019,37(11):69-70. 被引量:2
-
3孙悦,王斌,李晶,王超,赵化启,杨松涛.移动网络与云环境下的重认证和访问控制策略研究[J].电脑知识与技术,2020,16(2):35-36.
-
4杨佳丽.智能识别模式在电子发票会计核算中的应用[J].财会通讯,2021(9):119-122. 被引量:7
-
5王永刚.基于区块链的云存储数据访问安全控制算法[J].河北北方学院学报(自然科学版),2021,37(11):7-12. 被引量:7
-
6张雷,樊志杰,张冰,张丹丹,曹志威.基于双单向安全传输的移动警务请求服务总线平台的设计与实现[J].计算机测量与控制,2022,30(4):229-236. 被引量:4
-
7邵旭东,曹志威,樊志杰,吕抒钺,姚文猛,张林.移动警务跨域消息提醒服务系统的设计与实现[J].计算机测量与控制,2023,31(4):264-271. 被引量:1