期刊文献+

基于属性的空间数据访问控制研究 被引量:7

Research of attributed based spatial data access control
在线阅读 下载PDF
导出
摘要 目前空间数据网格中的访问权限控制基本是采用的设置用户角色和空间数据分级映射的机制,不能满足开放网格环境中的访问主体属性多样化和访问数据细粒度控制的要求。针对该问题,研究并提出了一种基于属性的空间数据安全访问机制。提出了基于ABAC(attribute based access control)的目标用户、空间数据、网格环境的属性描述模型;在XACML(extensible access control markup language)的基础上,设计了完整的基于属性的空间数据访问策略、框架和流程。通过该项目的应用,表明了该机制能够有效满足空间数据网格访问控制要求。 Currently, almost all the data access controls in spatial data grid are implemented by setting user roles and spatial data classification mapping mechanism, which can not satisfy the needs of open grid environment with diverse subject attributes and fine-grained control requirements. With respect to this problem, a spatial data access control mechanism based on attributes is put forward. First, an attributes description models of target users, spatial data and grid environment based on ABAC (attri- bute based access control) is proposed. Then on the basis of XACML (extensihle access control markup language), an integrated spatial data access strategy, framework and process are designed. Finally the application in program validates this mechanism meets the requirment of spatial data access control.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第3期803-808,共6页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(2009CB723906) 国家863高技术研究发展计划基金项目(2013AA12A301)
关键词 基于属性的访问控制模型 属性描述模型 空间数据网格 访问控制策略 扩展访问控制标记语言 ABAC attribute description model spatial data grid access control strategy XACML
  • 相关文献

参考文献3

二级参考文献20

  • 1胡庆生,王志功,张军,肖洁.2.5Gb/s Reed-Solomon译码器的VLSI优化实现[J].电路与系统学报,2005,10(2):57-65. 被引量:3
  • 2戴小红,潘志文.Reed-Solomon编译码器的设计与FPGA实现[J].现代电子技术,2006,29(3):119-121. 被引量:6
  • 3马建峰,王育民.二次剩余码的有效译码[J].西安电子科技大学学报,1996,23(3):295-302. 被引量:1
  • 4ETSI.TS 102361-1,2006,Electromagnetic compatibil ity and Radio spectrum Matters(ERM):Digital Mobile Radio(DMR) Systems:Part 1:DMR Air Interface(AI)protocol[S].Sophia Antipolis Cedex,Francet ETSI:130-132.http://www.etsi.org.
  • 5Sklar B.Digitsal Communications-2nd ed[M].New Jersey:Prentice Hall PTR,2001:445-450.
  • 6Rassey J L.Step-by-Step Decoding of the Bose-Chaudhuri-Hocquengbem Codes[J].IEEE Trans.Infonrm.Theory.1965(11):580-585.
  • 7Electromagnetic compatibility and radio spectrum matters(ERM),Digital mobile radio(DMR)systems,Part 1:DMR air interface(AI)protocol,ETSI TS 102 361-1V1.4.5[R].2007.
  • 8SANDHU S,HEATH R,PAULRAJ A.Space-time block codes ver-sus space-time trellis codes[C]//Proc of IEEE International Confe-rence Communications.2001:1132-1136.
  • 9SHI Jun,WESEL R D.Further error event diagram reduction usingalgorithmic techniques[C]//Proc of IEEE International Conference onCommunications.2003:2822-2826.
  • 10TRUONG T K,SHIH P Y,SU Wen-ku,et al.Algebraic decoding ofthe(89,45,17)quadratic residue code[J].IEEE Trans on Infor-mation Theory,2008,54(11):5005-5011.

共引文献6

同被引文献77

  • 1李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 2KISSERLI Nessim,PRENEEL Bart.A taxonomy of selfmodifying code for obfuscation[J].Computers&Security,2011,30(8):679-691.
  • 3GREESHMA Sarath,JAYAPRIYA R.Securing database server using homomorphism encryption and reencryption[J].Communications in Computer and Information Science,2015,536(8):277-289.
  • 4ZUNERA Jalil,ANWAR M Mirza.An invisible text watermarking algorithm using image watermark[C]//Tarek Sobh,Khaled Elleithy.Innovations in Computing Sciences and Software Engineering.New York:Springer,2010:147-152.
  • 5VAN der Sloot.Do privacy and data protection rules apply to legal persons and should they:A proposal for a two-tiered system[J].Computer Law&Security Review,2015,31(1):26-45.
  • 6VIVEK Balachandran,SABU Emmanuel.Software protection with obfuscation and encryption[J].Lecture Notes in Computer Science,2013,7863:309-320.
  • 7STEWART GW.The efficient generation of random orthogonal matrices with an application to condition estimators[J].SIAM Journal on Numerical Analysis,1980,17(3):403-409.
  • 8Jin Li,Xiaofeng Chen,Qiong Huang,Duncan S. Wong.??Digital provenance: Enabling secure data forensics in cloud computing(J)Future Generation Computer Systems . 2013
  • 9Simeon-Dubach Daniel,Perren Aurel.Better provenance for biobank samples. Nature . 2011
  • 10Luc Moreau,Ben Clifford,Juliana Freire,Joe Futrelle,Yolanda Gil,Paul Groth,Natalia Kwasnikowska,Simon Miles,Paolo Missier,Jim Myers,Beth Plale,Yogesh Simmhan,Eric Stephan,Jan Van den Bussche.??The Open Provenance Model core specification (v1.1)(J)Future Generation Computer Systems . 2010 (6)

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部