期刊文献+

一种带约束特性的网络信息下载监控模型

Network Information Download Monitor Model with Attribute Constraint
下载PDF
导出
摘要 为了对网络流量进行有效监控,保护网络服务器上重要的文件资源,论文首先对基于角色访问控制模型的时间约束特性和对象属性进行了研究,提出了一种带约束特性的网络信息恶意下载监控模型;设计了基于对象属性和时间更新的用户角色判定算法;设计并实现了基于时间特性和对象属性约束RBAC模型的网络信息下载监控系统;通过实验验证了该模型可对恶意下载行为进行有效地监视和控制,并且具有高效性、实时性和安全性. In order to monitor network traffic effectively,and to protect the important documentary resources in web servers,after deeply researched on the temporal constraint and object attribute of RBAC model,this paper put forward a network information download monitor model with attribute constraint.Designed a User-Role determine algorithm based on object attribute and time update.And then designed and implemented a network information download monitor system.Finally the experiments proved that this model can effectively monitor and control the malicious download activities,and has the high efficiency and security.
作者 张奇 庄毅
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第12期2433-2437,共5页 Journal of Chinese Computer Systems
基金 航空基金项目(05F2037)资助 国防基础研究基金项目(Q072006C002-1)资助
关键词 网络安全 恶意下载 角色访问控制 模型 network security malicious download RBAC model
  • 相关文献

参考文献14

  • 1赵亮,茅兵,谢立.访问控制研究综述[J].计算机工程,2004,30(2):1-2. 被引量:32
  • 2Sandhu R.Role-based access control models[J].IEEE Computer,1996,29(2):34-47. 被引量:1
  • 3Bertino E,Bonatti P A,Ferrari E.TRBAC:a temporal role-based access control model[J].ACM Transactions on Information and System Security,2001,4(3):191-233. 被引量:1
  • 4Joshi J B D,Bertino E,Latif U,et al.A generalized temporal role-based access control model[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(1):4-23. 被引量:1
  • 5Zou De-qing,He Li-gang,Jin Hai,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application covironment[J].Journal of Network and Computer Applications,2009,32:402-411. 被引量:1
  • 6鲁柯,周保群,王惠芳.基于带时间特性RBAC的使用控制模型及其管理[J].计算机工程,2008,34(6):170-172. 被引量:10
  • 7Ravi S Sandhu,Edward J Coyne,Hal L Feinstein,et al.Rolebased access control models[J].IEEE Computer,1991,29(2):38-47. 被引量:1
  • 8AHN G J,Sandhu R.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security,2000,3(4):207-226. 被引量:1
  • 9Ferraioio D F,Sandhu R,Gavrila S.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274. 被引量:1
  • 10Osborn S,Sandhu R.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000,3(2):85-106. 被引量:1

二级参考文献22

  • 1李沛武.用基于角色访问控制实现使用控制模型的管理[J].南昌工程学院学报,2005,24(1):47-50. 被引量:5
  • 2[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24. 被引量:1
  • 3[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42. 被引量:1
  • 4[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999. 被引量:1
  • 5[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47. 被引量:1
  • 6[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46. 被引量:1
  • 7[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206) 被引量:1
  • 8[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22 被引量:1
  • 9[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26 被引量:1
  • 10[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38 被引量:1

共引文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部