期刊文献+

一种异地协同设计中的安全策略 被引量:3

Access Control in Concurrent Design
在线阅读 下载PDF
导出
摘要 异地协同设计是典型的多用户参与的多任务系统 ,用户之间存在大量的协作过程。安全性是协同设计实施的关键问题。基于广域网协同设计系统的特点 ,提出了基于角色的多层强制访问控制和基于信息流的访问控制相结合的安全模型 。 Concurrent design environment is a multi-user,multi-task involved system,which is consisted of lots of collaborative processes.A resource access control mechanism is needed in such a sophisticated system.Based on the role-based mandatory model and information flow model,a combined security model is presented.Also,a control rule under this model is discussed.
出处 《工程设计学报》 CSCD 2001年第1期17-20,共4页 Chinese Journal of Engineering Design
关键词 访问控制 信息流 异地协同设计 并行工程 工程设计 安全性 access control concurrent design information flow
  • 相关文献

参考文献2

共引文献15

同被引文献13

  • 1M.J.Moyer,M.Abamad.Generalized role-based access control[A].In:2001. 21st International Conference on Distributed Computing Systems[C]. Mesa, AZ:INSPEC, 2001.391 -398.
  • 2R.Sandhu,E.Coyne,H.Feinstein,et al.Role-based access control:A multi-dimensional view[A].In:10th annual computer security applications conference[C].Orlando,FL,USA:IEEE CS Press,1994.54-61.
  • 3Ahn, Gail-Joon.Role-based access control in DCOM[J].Journal of Systems Architecture, 2000,46(13):1175-1184.
  • 4Byong G.Lee, N.Hari Narayanan, Kai H.Chang.An integrated approach to distributed version management and role-based access control in computer supported collaborative writing[J]. Journal of Systems and Software, 2001, 59 (2) :119-134.
  • 5A.Lin, R.Brown.The application of security policy to role-based access control and the common data security architecture[J].Computer Communications,2000,23(17):1584-1593.
  • 6R.S.Sandhu,E.J.Coyne, H.L.Feinstein, et al.Role-based access control models[J]. Computer, 1996,29(2):38 -47.
  • 7T.P.De Carvalho,N.Edelweiss.A visual query system implementing a temporal object-oriented model with roles on a relational database[A]. 1997. Proceedings., XVII International Conference of the Chilean on Computer Science Society[C],Valparaiso, Chile:INSPEC,1997:38-47.
  • 8翁亮,陈依群,诸鸿文.VPN用户认证技术[J].通信技术,1999,32(4):47-51. 被引量:3
  • 9陈性元,宋国文.IP-VPN及其关键技术[J].电信科学,2000,16(5):38-42. 被引量:9
  • 10辛明君,李洪,夏小明.VPN技术综述(上)[J].电信技术,2000(4):12-15. 被引量:9

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部