期刊文献+

基于PMI的电子政务访问控制体系 被引量:4

PMI-based E-government Access Control Architecture
下载PDF
导出
摘要 电子政务涉及到党政部门的内部信息资源,同时又要实现与民众间的双向交流,实现资源开放。从整体的角度看,整个安全体系结构具有多层次、大规模、复杂交互的分布式结构。电子政务需要一种大规模应用环境下具有高安全性和一定开放性的访问控制体系以满足安全需求。该文阐述了基于角色控制的ARBAC97模型在电子政务中的应用,并描述了如何利用权限管理基础设施来实现该访问控制模型。 The e-government involves both the internal information resources for the government and the public resources for exchanges. From the integer point of the view, the security architecture of the e-government is a large-scale multilevel distributed architecture. Therefore it is essential to look for a access control solution satisfying the need of the e-government application. This paper discusses the application of the Arbac97 model in e-government and presents a framework using PMI (Privilege Management Infrastructures) to implement role based access controls.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第17期114-116,共3页 Computer Engineering
基金 江苏省自然科学基金资助项目(BZ2001047)
关键词 访问控制 电子政务 权限管理基础设施 Access control E-government Privilege management infrastructure (PMI)
  • 相关文献

参考文献7

  • 1[1]Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1995 被引量:1
  • 2[2]Maly K J, Gupta A, Levinstein I B. A Privilege Management System for A Secure Network. Services in Distributed and Networked Environments, 1996. 被引量:1
  • 3[3]ITU-T Recommendation X.5091ISO/IEC 9594-8: Information Technology-open Systems Interconnection-the Directory: Public-key and Attribute Certificate Frameworks. 1995 被引量:1
  • 4[4]Service by e-Contract-a Security Model for Authentication, Aecess Control and Online Subscription Management in Multi-service-multi Provider Architectures. www.nue.et-inf. uni-siegen.de/~friesen/publications/ 被引量:1
  • 5[5]Oppliger R, Pernul G, Strauss C. Using Attribute Certificates to Implement Role-based Authorization and Access Controls. In Proceedings of the 4. Fachtagung Sicherheit in Informationssystemen (SIS 2000),2000:169-184 被引量:1
  • 6[6]Chadwick D W. A X.509 Role-based Privilege Management Infrastructure. Busines Sbriefing: Global Info Security, 2002 被引量:1
  • 7[7]Chadwick D W, Otenko A. RBAC Policies in XML for X.509 Based Privilege Management. http//sec.isi.salford.ac.uk/download/ Sec2002Final l.pdf,2002 被引量:1

同被引文献27

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部