期刊文献+

基于ACL的小型企业MIS的访问控制

Implementation of Small Enterprise MIS Access Control Based on ACL
在线阅读 下载PDF
导出
摘要 目前,在企业MIS中的访问控制主要有DAC和RBAC两种模型。本文分析比较了这两种模型的优缺点及其关系,给出了用ACL来实现小型企业MIS系统中的访问控制的实例。 In general, there are two models as the means of Enterprise MIS Access Control: DAC and RBAC. We analyze the advantages and disadvantages of DAC and RBAC, as well as the relations between them. And we present the instance of implementing Enterprise MIS Access Control by means of ACL.
出处 《电脑与电信》 2007年第12期16-17,共2页 Computer & Telecommunication
关键词 访问控制 权限 RBAC DAC ACL NET Access Control Privilege RBAC DAC ACL NET
  • 相关文献

参考文献2

二级参考文献6

  • 1[1]Department ofDefense ComputerSecuritvCenter. Trusted Computer System Evaluation Criteria. DoD 5200. 28-STD, 1985
  • 2[2]Ferraiolo D, Cugini J, Kuhn R. Role Based Access Control (RBAC): Features and Motivations,In Proceedings of 11th Annual Computer Security Application Conference, New Orleans, LA,1995 -12:241-248
  • 3[3]Sandhu S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1996, 29(2):38-47
  • 4[4]Bell D, LaPadula L. Secure Computer Systems: Mathematical Foundations. MITRE Technical Report 2547, 1973,1
  • 5[5]Biba K. Integrity Considerations for Secure Computer Systems.Technical Report MTR-3153, the MITRE Corporation, Bedford,MA, 1975
  • 6[6]Clark D, Wilson D. A Comparison of Commercial and Militurv Computer Security Policies. In IEEE Svmposium on Security and Privacy, 1987

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部