期刊文献+

一种数据级安全访问控制方案 被引量:3

A Solution of Data-Level Security Access Control
下载PDF
导出
摘要 为了更好地保护Web应用系统中敏感数据不被非法访问.在传统的基于角色的访问控制模型基础上提出了由用户集合和数据访问权限构成的数据访问策略,并将数据访问策略关联到功能,通过对原有业务SQL解析,使用行级访问权限对数据记录进行行级过滤,再根据列级访问权限对数据记录相应属性进行屏蔽处理来进行数据安全访问控制,并设计了数据安全访问控制的框架.最后将该方案应用到新发地农产品供应链管理平台中,验证了该方案的可行性和有效性. To protect sensitive data in Web applications from unauthorized access, a data access strategy consisting of user set and data access authority is proposed, which is based on traditional role based access control model. The data access strategy is related to function. After parsing the original business SQL, row-level-rules are applied to filter the data records in row level, and column-level-rules are applied to mask the corresponding attributes of the data records. A data security access control framework is designed. Finally, this strategy is implemented in the Agricultural Products Supply Chain Management System of Xinfadi, and the validity and effectiveness of the presented strategy is demonstrated.
出处 《计算机系统应用》 2013年第9期81-85,74,共6页 Computer Systems & Applications
基金 国家重点基础研究发展计划(973)(2009CB320704) 国家高技术研究发展计划(863)(2012AA011204) 国家科技支撑计划(2012BAH05F02)
关键词 数据访问策略 行级权限 列级权限 SQL解析 data access strategy row-level-rules column-level-rules SQL analysis
  • 相关文献

参考文献12

二级参考文献49

共引文献105

同被引文献23

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3胡和平,徐蔚.基于J2EE的权限管理框架实现[J].计算机工程与科学,2007,29(6):109-112. 被引量:5
  • 4Sandhu R .S. Role-Based Access Control Models[J]. IEEE Computer, 1996, 29(2):38-47. 被引量:1
  • 5Domain Object Seeurity (ACLs). Security (ACLs). http://d~cs.spring.i~/springsecurity/site/d~cs/:~.2.4.RELEASE/re~rencc/hm~mg~. 被引量:1
  • 6刘天.AOP与权限控制研究[D].大连理工大 学,2005. 被引量:1
  • 7The AspectJ Developer's Notebook. http://www.eclipse.org/aspectj/doc/released/adknotebook/index.htnfl. 被引量:1
  • 8Rashid Z Basita,Anwar Z.TRDBAC:Temporal reflective database access control[C]//Proceedings of the 6th International Conference on Emerging Technologies.IEEE,2010:337-342. 被引量:1
  • 9Chen Jincui,Jiang Liqun.Role-based access control model of cloud computing[C]//Proceedings of the International Conference on Energy Systems and Electrical Power.Singapore:Elsevier Ltd,2011:1056-1061. 被引量:1
  • 10Shravani D,Suresh P V,Padmaja B R,et al.Web services security architectures composition and contract design using RABC[J].International Journal on Computer Science and Engineering,2010,8(2):2609-2615. 被引量:1

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部