期刊文献+

基于组织机构的应用区域边界访问控制系统的研究 被引量:3

The Research on Application Enclave Boundary Access Control System Based on Organization Structure
下载PDF
导出
摘要 分析了应用区域边界安全系统的特点,指出了现有访问控制技术用于应用区域边界安全系统时所存在的不足,提出了适合于应用区域边界安全的访问控制形式化模型,给出并形式化地描述了基于组织机构的应用区域边界安全系统中实施访问控制管理时应遵循的规则。 The paper analyses the characteristic of application enclave boundary system,points the shortcoming of the existed access control technologies when they are applied in network application enclave perimeter system.Then we propose a access control formal model adapted to application enclave boundary.Finally we put forward and formally discribe the rule which we should observe when we request through the organization structure's application enclave boundary.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第25期131-134,170,共5页 Computer Engineering and Applications
基金 国家973重点基础研究发展规化项目(编号:G1999035801)资助
关键词 访问控制 基于角色 应用区域边界安全 access control,role based,security of application enclave boundary
  • 相关文献

参考文献9

  • 1DAVID F FERRAIOLO,RAVI SANDHU.Proposed NIST Standard for Role-Based Access Control[J].ACM Transcations on informtion and System Security,2001 ;4(3) :224~274 被引量:1
  • 2Ravi S Sandhu,Edward J Conyne.Role-Based Access Control Models[J].IEEE Computer, 1996 ;29(2): 38~48 被引量:1
  • 3ZAHIR TARI,SHUN-WU CHAN.A Role-Based Access Control For Intranet Security[J].IEEE INTRANET COMPUTING, 1997 ;24~25 被引量:1
  • 4DAVID F FERRAIOLO,JOHN F BARKLEY,D RICHARD KUHN.A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transactions on Information and System Security, 1999;2(1 ) 被引量:1
  • 5SYLVIA OSBORN,RAVI SANDHU,QAMAR MUNAWER.Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J].ACM Transactions on Information and System Security,2000;3(2) :85~106 被引量:1
  • 6D Nessett,p Humeen.The multilayer firewall[C].In:Network and Distributed System Security Symposium,1998-03 被引量:1
  • 7Len LaPadula. Secure Computer System:Mathematical Foundations[J].Journal of computer security, 1996;4 被引量:1
  • 8Len LaPadula. Secure Computer System:A Mathematical Model[J].Journal of computer security, 1996 ;4 被引量:1
  • 9National security agency.information assurance solution technical directors :Information Assurance Technical Framework[M].Release 3.0,2000 被引量:1

同被引文献38

  • 1赵佳,韩臻.一种简化的基于任务的信息网格访问控制模型[J].仪器仪表学报,2006,27(z3):1849-1851. 被引量:2
  • 2许访,沈昌祥.基于任务的强制访问控制模型[J].计算机应用研究,2004,21(11):70-71. 被引量:7
  • 3彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 4Lasance M.Single sign on pipe dream or reality[EB/OL].http:// www.ecominofo.net/art/s/980_ maxware.htm. 被引量:1
  • 5Pfitzmann B,Waidner M.Analysis of liberty single-sign-on with enabled clients[J].IEEE Internet Computing,2003,7(6):38-44. 被引量:1
  • 6Javelin Strategy and Research,Better Business Bureau,Idantity Theft Resource Center, Federal Trade Commission,Gartaer and Privacy and America Business.How many identity theft victims are there? What is the impact on victims? [EB/OL] .http:// www.privacyrights.org/ar/idtheftsurveys.Htm #BBB. 被引量:1
  • 7Spencer C Lee.An introduction to identity management[EB/OL]. http://www.sans.org/reading_room/whitepapers/authentication/852.php. 被引量:1
  • 8Duncan A Buell,Ravi Sandhu.ldentity management[J].IEEE Internet Computing,2003,7(6):26-28. 被引量:1
  • 9Liberty alliance project: Identity-management [EB/OL] .http:// www.proj ectliberty.org. 被引量:1
  • 10吴钝 盛可军 刘吉强 等.RBAC模型在应用区域边界的应用.计算机科学与实践,2004,2(1):122-125. 被引量:1

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部