期刊文献+

从“维基解密”事件看公安网络安全管理重要性 被引量:4

Importance of Polic Network Security Management See From WikiLeaks
在线阅读 下载PDF
导出
摘要 基于角色的访问控制模型RBAC是防止非法访问数据、预防网络破坏、保障网络安全的一种重要方法。RBAC的核心是定义了一组强制性规则来约束授权的角色。针对公安信息网络管理和应用存在的问题,重点研究了如何利用角色授权、约束控制和对保密数据分粒度进行管理等方面来规范对公安信息网络的安全管理和使用。 RBAC is an important method to prevent data from unauthorized access, prevent damage to network, ensure the security of network.RBAC Core is to define a set of mandatory rules to restrict the authorized role.Specific to some existing problems in polic network management and application,the paper focus on how to use roles authorization, constraints and manage secret data in a particle size,and so on,to specification the security management and use in polic network.
作者 许发见
机构地区 福建警察学院
出处 《信息网络安全》 2011年第2期2-4,共3页 Netinfo Security
基金 福建省科技厅高校科技项目"公安大情报系统中犯罪信息关联分析及线索图形化研究"(JK2009052)
关键词 RBAC 约束 公安网络 数据粒度 RBAC restrict polic network partially data
  • 相关文献

参考文献3

  • 1Jaeger,T.On the increasing importance of constraints[C].In Proceedings of 4th ACM Workshop on Role-Based Access Control,1999.33-42.
  • 2Bertino E,Bettini C,Ferrari E,Samarati P.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Trans.on Database Systems (TODS),1998,23(3):231,285.
  • 3王卓,冯珊.基于角色访问控制模型约束的OCL描述[J].计算机工程与应用,2003,39(21):100-102. 被引量:7

二级参考文献12

  • 1[美]GradyBooth JamesRumbaugh IvarJacobson.UML用户指南[M].北京:机械工业出版社,2001..
  • 2OMG Web site.Unified Modeling Language Notation Guide[M].Version 1.3,2000.
  • 3Sandhu R,Bhamidipati V.The ARBAC97 Model for Role based Administration of Role :Preliminary Description and Outline[C].In:Proceedings of the 2th ACM Workshop on Role--Based Access Control, ACM. 1997.
  • 4Ravi Sandhu.Rational for the RBAC96 Family of Access Control Models[C].In:Proceedings of 1st ACM Workshop on Role-based Access control, ACM, 1997.
  • 5Sandhu R,Coyne E J.Role-Based Access Control Models[J].IEEE Computer, 1996;29(2) :38---47.
  • 6Gail-Joon Ahn,Ravi Sandhu.Role-based Authorization Constraints Specification[J].ACM Transactions on Information and Systems Security, 2000;3(4).
  • 7Chen F,Sandhu R.Constraints for role based access control[C].In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, 1995 : 39-46.
  • 8Pete Epstein,Ravi S Sandhu.Towards a UML Based Approach to Role Engineering[C].In:ACM Workshop on Role-Based Access Control, 1999 : 135-143.
  • 94.Michael E Shin,Gail-Joon Ahn.UML-based Representation of Role-based Access Control[C].In:Proceedings of 5th IEEE International Workshop on Enterprise Security,NIST,MD,2000.
  • 10Object Constraint Language Specification[S].A web version is in:http: //www.software.ibm.com/ad/ocl ,v.1.1,Rational software Corp, 1997.

共引文献6

同被引文献28

  • 1何颖.维基解密事件对于构建我国网络与信息安全体系的几点思考.赛迪专报,2011,(01):1-12.
  • 2任翔.我国情报信息主导警务的实践探索[J].中国人民公安大学学报(社会科学版),2007,23(6):24-28. 被引量:18
  • 3United States Department of Justice.Fusion Center Guide-lines—Developing and Sharing Information in a New Era. . 2006
  • 4Kevin Saupp.Fusion Liaison Officer Programs:Effective Shar-ing of Information to Prevent Crime and Terrorism. The po-lice chief . 2010
  • 5Jim Weiss,Mickey Davis.Information Sharing:The NortheastOhio Regional Fusion Center. Journal of Counterterrorism&Homeland Security International . 2011
  • 6Rebecca Kanable.Fusion centers grow up. Law enforcementtechnology . 2011
  • 7(英) 莱特克里菲 (Ratcliffe,J.),著.情报主导警务(M)中国人民公安大学出版社, 2010
  • 8Lambert,David.??Intelligence-Led Policing in a Fusion Center(J)FBI Law Enforcement Bulletin . 2010 (12)
  • 9Sen Tom Coburn.Fusion Center follies. C4ISR:The journalof net-centric warfare . 2012
  • 10倪红彪.浅议公安系统网络安全与建设[J].吉林公安高等专科学校学报,2009,24(5):75-77. 被引量:1

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部