期刊文献+

访问控制研究综述 被引量:31

Survey of Acess Control
下载PDF
导出
摘要 访问控制技术是实现安全操作系统的核心技术。它通过控制用户对系统信息资源的访问,来达到系统信息资源的保密性和完整性。文章对访问控制近年的研究状况和成果做了一个综述,首先介绍了两个基本理论模型,然后讨论了访问控制主要的安全策略和实现技术及其优缺点,最后对访问控制研究的发展趋势进行了展望。 Access control technology is one of the key issues to concern in developing secure operating system. By controlling the user's access to information and resource, access control ensures the confidentiality and integrity of system. This paper presents a survey on recent researches of access control. Two fundamental theoretical models are investigated. Meanwhile, some security policies and implementation approaches as well as their advantages and disadvantages are discussed. Furthermore, the trends of the research of access control are predicated.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第2期1-2,189,共3页 Computer Engineering
基金 国家"863"计划资助项目(2001AA144010)
关键词 访问控制 安全操作系统 安全策略 Access control Secure operating system Security policy
  • 相关文献

参考文献5

  • 1[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 2[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 3[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 4[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 5[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24

同被引文献162

引证文献31

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部