期刊文献+

访问控制策略的分类方法研究 被引量:5

Classification Method for Access Control Policies
在线阅读 下载PDF
导出
摘要 访问控制是网络安全防范和保护的主要策略,回顾了几种访问控制策略的分类方法,提出了一种新的分类方法,将访问控制策略划分为被动和主动类型,分别介绍了几种有代表性的访问控制策略,对比分析了各自的特点及适用环境。 Access control is the major policy for network security precaution and protection. With the growing problem of network security, research on access control policy has become a hot research topic for computer science. Several kinds of classification of access control policies were introduced, and a new classiflcation method was proposed. Access control can be divided into passive type and active type, several typical access control polices were introduced, and their characteristics and application environment were discussed.
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2011年第6期878-882,共5页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 国家自然科学基金资助项目(60873225) 浙江师范大学省级重中之重学科开放基金资助项目(ZSDZZZZXK05)
关键词 网络安全 访问控制策略 被动访问控制 主动访问控制 network security access control policy passive access control active access control
  • 相关文献

参考文献30

  • 1林莉,怀进鹏,李先贤.基于属性的访问控制策略合成代数[J].软件学报,2009,20(2):403-414. 被引量:41
  • 2LAMPSON B W. Protection [ J ]. ACM Operating Systems Reviews, 1974,8 (1) : 18 - 24.
  • 3GRAHAM G S, DENNING P J. Protection - principles and practice [ J ]. AFIPS Spring Joint Computer Conferenee, 1972(40) :417 -429.
  • 4吴新松,周洲仪,贺也平,梁洪亮,袁春阳.基于静态分析的强制访问控制框架的正确性验证[J].计算机学报,2009,32(4):730-739. 被引量:4
  • 5FERRAIOLO D, KUHN D R. Role - based access control [ C ]//15 th National Computer Security Conf. Baltimore: [ s. n. ] , 1992:554 - 563.
  • 6SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role -based access control models [ J ]. IEEE Computer,1996,29(2) :38 -47.
  • 7FERRAIOLO D F, SANDHU R S, GAVRILA S. Proposed NIST standard for role - based access control [J]. ACM Transaction on Information and Systems Security, 2001,4 ( 3 ) : 224 - 274.
  • 8ANSI. American national standard for information technology - role based access control [ C ]//ANSI INCITS 359-2004. [S. l. ] :[s. n. ] ,2004:3 -11.
  • 9THOMAS R K,SANDHU R S. Towards a task - based paradigm for flexible and adaptable access control in distributed applications[ C ]//Proceedings on the 1992 1993 Workshop on New Security Paradigms. [S. l. ] :[s. n. ] ,1993:138 -142.
  • 10THOMAS R K, SANDHU R S. Conceptual foundations for a model of task - based authorizations [ C ]//7th IEEE Computer Security Foundations Workshop. [S. l. ] :[s. n. ] ,1994:66 -79.

二级参考文献101

  • 1HUAI Jinpeng HU Chunming LI Jianxin SUN Hailong WO Tianyu.CROWN:A service grid middleware with trust management mechanism[J].Science in China(Series F),2006,49(6):731-758. 被引量:8
  • 2Rohit Khare. Web Security: A Matter of Trust. Sebastopol: O'Reilly & Associates Inc, 1997
  • 3Ferraiolo D, Kuhn R. Role-based access controls. In: Proc of the 15th NIST-NCSC National Computer Security Conference. Garthersburg, MD: National Institute of Standards and Technology, 1992. 554~563
  • 4Sandhu R, Conyne EJ, Lfeinstein H, et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 5Park Joon S, Sandhu R, Ahn Gail-Joon. Role-based access control on the Web. ACM Trans on Information and System Security, 2001, 4(1): 37~71
  • 6Thomas R K, Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proc of the IFIP WG11.3 Workshop on Database Security. London: Chapman & Hall, 1997. 166~181
  • 7D kristol, L Montulli. HTTP state management mechanism. RFC 2965, Network Working Group, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc2965.txt, 2000
  • 8Bell David E, LaPadula Leonard J. Secure computer system: Unified exposition and MULTICS interpretation. The MITRE Corporation, Bedford, MA, USA: MTR-2997 Rev. 1, 1976
  • 9Biba K J. Integrity considerations for secure computer systems. Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, MA, USA: ESDTR-76-372, 1977
  • 10Fraser Timothy. LOMAC: Low water-mark integrity protection for COTS environments. NAI Labs Report 0775, 2000

共引文献135

同被引文献42

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部