期刊文献+

基于访问控制的数据库安全模型比较研究 被引量:1

Comparative Study of database security models based access control
下载PDF
导出
摘要 本文详细地介绍了目前常用及前沿的数据库安全模型,比较了各种安全模型的优缺点,以及在应用过程中的利弊。在此基础上提出未来数据库安全模型的发展趋势。 A deteailed introduction is made of the current database security models, which are pioneering and commonly adopted. Those models'advantages and disadvantages are compared both in theory and practice. In view of the above,the future developmental trend of database is put forward.
出处 《渤海大学学报(自然科学版)》 CAS 2006年第4期379-382,共4页 Journal of Bohai University:Natural Science Edition
基金 国家基础研究重大项目(973)研究专项(No:2001CCA00700) 公安部项目(No:200321901)
关键词 数据库 安全模型 访问控制 databases Security models access control
  • 相关文献

参考文献9

二级参考文献39

  • 1[1]Bell D E, La Padula L J. Secure computer system: Unified exposition and MULTICS interpretation[R]. The MITRE Corporation, TechRep: MTR-2997 Revision 1, 1976. 被引量:1
  • 2[2]Lin Bell T Y, LaPadula Axioms. A "new" paradigm for an "old" model[J]. ACM,1993,82-93. 被引量:1
  • 3[3]Denning D E. A lattice model of secure informationflow[J].Communications of the ACM,1976,19(5):236-243. 被引量:1
  • 4[4]Gregory R Andrews, Richard P Reitman. An axiom axiomatic approach to information flow in programs[J].ACM Transaction on Programming Languages and System,1980,2(1):56-76. 被引量:1
  • 5[5]Dorothy E Denning, Peter J Denning. Certification of programs for secure information flow[J]. Communications of the ACM,1977,20(7):504-513. 被引量:1
  • 6[6]Cohen E. Information transmission in computational systems[A]. In:Operating System Principles[C]. Proc 6th Syrup,1977,11:133-139. 被引量:1
  • 7[7]Jones A K, Lipton R J. The enforcement of security policies for computation[A]. In:Operating System Principles[C].Proc 5th Syrup,1975,11:197-206. 被引量:1
  • 8[8]John McHugh. Covert channel analysis: a chapter of the handbook for the computer security certification of trusted systems[R]. Portland State University, 1995. 被引量:1
  • 9[9]Lin T Y. Probabilistic measure on aggregation[A]. In:Security Application Conference[C].Proceeding of 6th Annual Computer, 1990. 被引量:1
  • 10[10]Steven T Eckmann. Eliminating formal flows in automated information flow analysis[J].IEEE,1994:30-38. 被引量:1

共引文献122

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部