期刊文献+

基于被管对象的网管权限分配技术分析

Authority Assignment Technology of Network Management Based on Managed Object
下载PDF
导出
摘要 针对传统网络管理系统权限分配单一、操作复杂且易误操作的问题,提出了基于被管对象的网管权限分配技术。介绍了基于被管对象的网管权限分配技术的优点及软件设计的思路。针对各模块的功能进行了详细阐述,并对系统权限及授权机制和方法进行了介绍,实现了不同用户角色的分权管理和互相监督要求,保证了数据安全。通过实例验证了基于被管对象的网管权限分配技术的可行性和易操作性。 Aiming at the problem of single authority assignment,complex operation and easy misoperation in the traditional network management system,the authority assignment technology of network management based on managed object is proposed.The advantages and ideas of software design are introduced.The functions of each module are described in detail.The authority and authorization mechanism and methods are introduced.The decentralized management and mutual supervision of different user roles are realized.So the data security is ensured.At last,the feasibility and operability of the technology are showed though the examples.
作者 宋晶晶 SONG Jingjing(The 54th Research Institute of CETC,Shijiazhuang 050081,China)
出处 《计算机与网络》 2022年第10期41-44,共4页 Computer & Network
关键词 被管对象 权限分配 角色授权 数据安全 managed object authority assignment role authorization data security
  • 相关文献

参考文献6

二级参考文献33

  • 1高燕,张维,陈小辉.基于RBAC的可复用的权限管理设计与实现[J].科学技术与工程,2007,7(15):3959-3963. 被引量:5
  • 2Ritchie 0 M,Thompson K. The UNIX time-sharing system [ J ]. BellSystem Technical Journal, 1978,57(6): 1905-1929. 被引量:1
  • 3Qiu Lili, Zhang Yin, Wang Feng, et al. Trusted computer systemevaluation criteria [ S ]. [ S. 1. ] : National Computer Security Center,1985. 被引量:1
  • 4Barrera D, Kayacik H G, Van Oorschot P C, ei al. A methodologyfor empirical analysis of permission-based security models and its ap-plication to Android[ C ] //Proc of the 17th ACM Conference on Com-puter and Communications Security. New York : ACM Press, 2010 :73-84. 被引量:1
  • 5Felt A P, Greenwood K, Wagner D. The effectiveness of install-timepermission systems for third-party applications, UCB/EECS-2010-143[R]. Berkeley: University of California, 2010. 被引量:1
  • 6Felt A P, Ha E, Egelman S, et al. Android permissions: user atten-tion, comprehension, and behavior[ C ] //Proc of the 8th Symposiumon Usable Privacy and Security. New York : ACM Press, 2012 : 3. 被引量:1
  • 7Nauman M, Khan S, Zhang X. Apex: extending Android permissionmodel and enforcement with user-defined runtime constraints [ C ]//Proc of the 5th ACM Symposium on Information, Computer and Com-munications Security. New York:ACM Press, 2010: 328-332. 被引量:1
  • 8Conti M,Nguyen V T N, Crispo B. CRePE: context-related policyenforcement for Android [ M ] //Information Security. Berlin : Sprin-ger, 2011: 331-345. 被引量:1
  • 9Ongtang M,McLaughlin S,Enck W,et al. Semantically rich appli-cation-centric security in Android [ J ]. Security 3nd Communica-tion Networks, 2012, 5(6) : 658-673. 被引量:1
  • 10Davi L, Dmitrienko A, Sadeghi A R, ef al. Privilege escalationattacks on Android [ M ]//Information Security. Berlin : Springer,2011: 346-360. 被引量:1

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部