期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
集中式访问控制管理综述
1
作者 张颖 《科学技术创新》 2017年第25期134-135,共2页
结合实际,针对集中式访问控制管理技术进行了论述。
关键词 集中式访问控制技术 RADIUS TACACS DIAMETER
下载PDF
基于授权管理基础设施的授权及访问控制机制 被引量:2
2
作者 王毅彦 《计算机系统应用》 2005年第9期22-25,共4页
与传统的权限管理机制相比,基于授权管理基础设施实现的集中式访问控制机制,能够有效地实现权限的统一管理和权限信息的相对独立,使系统具有更高的安全性和灵活性。文章介绍了基于授权管理基础设施的集中式授权及访问控制机制,并重点探... 与传统的权限管理机制相比,基于授权管理基础设施实现的集中式访问控制机制,能够有效地实现权限的统一管理和权限信息的相对独立,使系统具有更高的安全性和灵活性。文章介绍了基于授权管理基础设施的集中式授权及访问控制机制,并重点探讨其不同的实现方式。 展开更多
关键词 信息安全 授权 集中式访问控制 授权管理基础设施 访问控制机制 管理机制 统一管理 集中式 权限 安全性
下载PDF
An application-layer based centralized information access control for VPN 被引量:2
3
作者 欧阳凯 周敬利 +1 位作者 夏涛 余胜生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期240-249,共10页
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality... With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper. 展开更多
关键词 Virtual private network Access control TUNNELING Centralized management STREAM
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部