期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于统一身份认证平台的局域网安全设计 被引量:4
1
作者 张建伟 《计算机技术与发展》 2019年第1期124-129,共6页
对于局域网进行安全设计时首先要以提高网络系统安全性为目标,其次还要保证局域网上的应用系统的安全性满足相应标准。对服务器、个人终端、网络接入设备、防火墙在内的所有参与到局域网服务过程中的节点进行分析研究,判断出网络系统安... 对于局域网进行安全设计时首先要以提高网络系统安全性为目标,其次还要保证局域网上的应用系统的安全性满足相应标准。对服务器、个人终端、网络接入设备、防火墙在内的所有参与到局域网服务过程中的节点进行分析研究,判断出网络系统安全存在的薄弱点。在这其中,"准入准出"平台的设计和建立是首先要考虑的技术手段。基于"统一身份认证"这一普遍使用的"准入准出"技术,以宝鸡文理学院局域网网络安全设计和建设为实例,讨论统一身份认证技术在网络安全中的应用。首先研究了统一认证平台的设计思想和具体功能,在这一基础上,画出了该平台的体系架构图;然后分别从目录服务、用户(角色)管理、同步管理、认证过程和授权管理等五个方面详细阐述了统一认证平台的设计,为局域网在安全规划和设计方面提供了有益的参考。 展开更多
关键词 局域网 准入准出 统一身份认证 用户(角色)管理 认证过程 授权管理
下载PDF
Consistency maintenance for constraint in role-based access control model 被引量:3
2
作者 韩伟力 陈刚 +1 位作者 尹建伟 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第3期292-297,共6页
Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenan... Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD PDM, an enterprise oriented product data management (PDM) system. 展开更多
关键词 Consistency maintenance Role based access control Product data management CONSTRAINT
下载PDF
Research and Realization of the Role-Based System Access Control Management 被引量:1
3
作者 蔡红 陈荣耀 令狐佳 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期267-269,共3页
The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based acc... The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based access control management which is relatively independent in the applied system. This management achieves the control on user's access by distribution and cancel of role-play,which is a better solution to the problems of the access control management for the applied system. Besides,a complete scheme for the realization of this access control was provided. 展开更多
关键词 access control user distribution
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部