期刊文献+
共找到619篇文章
< 1 2 31 >
每页显示 20 50 100
Attribute-Based Encryption for Secure Access Control in Personal Health Records
1
作者 Dakshnamoorthy Manivannan 《Computer Systems Science & Engineering》 2025年第1期533-555,共23页
Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets... Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets such as roles,specialties,or certifications.This data-centric cryptographic paradigm enables highly fine-grained,policydriven access control,minimizing the need for identity management and supporting scalable multi-user scenarios.This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade.It explores the evolution of these schemes,analyzing their design principles,strengths,limitations,and the level of granularity they offer in access control.The review also evaluates the security guarantees,efficiency,and practical applicability of these schemes in real-world healthcare environments.Furthermore,the paper outlines the current state of ABE as a mechanism for safeguarding EHR data and managing user access,while also identifying the key challenges that remain.Open issues such as scalability,revocation mechanisms,policy updates,and interoperability are discussed in detail,providing valuable insights for researchers and practitioners aiming to advance the secure management of health information systems. 展开更多
关键词 Attribute-based encryption attribute-based access control data security cloud security privacypreserving healthcare IoMT security blockchain-based access control
在线阅读 下载PDF
DPZTN:Data-Plane-Based Access Control Zero-Trust Network
2
作者 Jingfu Yan Huachun Zhou Weilin Wang 《Computer Systems Science & Engineering》 2025年第1期499-531,共33页
The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust netw... The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s. 展开更多
关键词 Zero trust network data plane bayesian-based behavior evaluation blockchain-based access control security functions
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
3
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
4
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
Security and Privacy Frameworks for Access Control Big Data Systems 被引量:3
5
作者 Paolina Centonze 《Computers, Materials & Continua》 SCIE EI 2019年第5期361-374,共14页
In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have t... In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework. 展开更多
关键词 Big data access control distributed systems SECURITY PRIVACY
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
6
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent System and secure Java Agent Development Framework
在线阅读 下载PDF
Secure Remote Access IPSEC Virtual Private Network to University Network System 被引量:1
7
作者 Gajendra Sharma 《Journal of Computer Science Research》 2021年第1期16-27,共12页
With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construct... With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet. 展开更多
关键词 IPSEC VPN Network Communication data ENCRYPTION Integrity authentication Remote access UNIVERSITY Security Server CLIENT PEER
在线阅读 下载PDF
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
8
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 dataBASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
在线阅读 下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
9
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
在线阅读 下载PDF
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
10
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
利用NTBACKUP工具实现电子病历文本的自动备份 被引量:2
11
作者 杨栋 苏小刚 任志刚 《医疗卫生装备》 CAS 2008年第4期47-48,共2页
目的:制定完善、可靠的电子病历文本备份方案,保证电子病历信息数据的安全。方法:根据医院信息系统运行负载的变化规律和电子病历文本文件的存储特点,利用Windows自带的NTBACKUP备份工具和批处理技术实施备份。结果:制定了自动、定时执... 目的:制定完善、可靠的电子病历文本备份方案,保证电子病历信息数据的安全。方法:根据医院信息系统运行负载的变化规律和电子病历文本文件的存储特点,利用Windows自带的NTBACKUP备份工具和批处理技术实施备份。结果:制定了自动、定时执行的备份计划,有效地保证了电子病历信息的数据安全。结论:该备份方法基本满足了电子病历备份的要求,但仍有改进的余地。 展开更多
关键词 电子病历 数据安全 备份
暂未订购
基于动态数据敏感等级的大数据细粒度访问控制模型
12
作者 张焕 侯明星 +1 位作者 刘光娜 史颖 《计算机科学》 北大核心 2026年第2期187-195,共9页
针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据... 针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据的实时敏感等级,克服了传统静态分类的僵化性。在此基础上,将动态敏感等级作为核心决策属性,与基于属性的访问控制模型深度集成,设计了一种情境自适应的权限动态授予与撤销机制,实现了对不同用户在不同时间、地点及场景下访问行为的精准管控。实验结果表明,该模型能够在保证较低性能开销的同时,有效感知数据价值与风险的变化,相较于传统基于角色的访问控制模型和静态基于属性的访问控制模型,在权限分配的精确度与安全性上均有显著提升,尤其适用于数据流动频繁、安全需求多变的大数据应用场景,为构建智能、自适应的数据安全防护体系提供了有效途径。 展开更多
关键词 大数据安全 访问控制 细粒度 动态敏感等级 属性基访问控制
在线阅读 下载PDF
云端移动应用的数据安全访问控制方法
13
作者 王利斌 胡鑫 王亚静 《移动信息》 2026年第2期89-91,共3页
云端移动应用在分布式环境下面临着复杂的数据安全访问控制挑战,而传统访问控制机制难以适应移动终端的多样性及网络环境的动态性要求。针对该问题,文中构建了一种分布式身份验证机制,通过细粒度权限管控算法建立了上下文感知访问决策模... 云端移动应用在分布式环境下面临着复杂的数据安全访问控制挑战,而传统访问控制机制难以适应移动终端的多样性及网络环境的动态性要求。针对该问题,文中构建了一种分布式身份验证机制,通过细粒度权限管控算法建立了上下文感知访问决策模型,并基于多层安全防护体系实现了访问控制性能的优化。实验表明,该方法能有效提升系统的安全防护能力,在保障移动应用正常运行的前提下显著增强了访问控制效果。 展开更多
关键词 云端移动应用 数据安全访问控制 分布式身份验证
在线阅读 下载PDF
Veritas NetBackup备份软件在数字图书馆中的应用 被引量:1
14
作者 陈宗仁 《科技情报开发与经济》 2007年第4期7-9,共3页
通过分析不同数据的备份方式,以及现代数字图书馆网络设备和数据应用分布情况,详细讲述了Veritas NetBackup备份软件在广东外语外贸大学图书馆的应用实施过程以及管理操作的方法,阐述了Veritas NetBackup备份软件在数字图书馆中的重要... 通过分析不同数据的备份方式,以及现代数字图书馆网络设备和数据应用分布情况,详细讲述了Veritas NetBackup备份软件在广东外语外贸大学图书馆的应用实施过程以及管理操作的方法,阐述了Veritas NetBackup备份软件在数字图书馆中的重要作用。 展开更多
关键词 数据安全:数据备份 备份策 VERITAS NETbackup
在线阅读 下载PDF
浅谈基于VB与ACCESS的应用程序体系的安全问题 被引量:1
15
作者 黄雅琼 《电脑知识与技术》 2013年第11X期7398-7399,7407,共3页
VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和V... VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和VB相结合的应用,是一种实用性很强的技术方案。数据库的主要任务是存储信息和管理信息,而这些信息往往对于人来说极具隐秘性,所以这些信息的安全问题成为人们最关心的问题之一。数据库作为信息的聚集体,它的安全性问题也就成为了信息安全的最大挑战。Access是一种关系型数据库管理系统,它是一种桌面应用程序,并不是Web应用程序,所以Access在网络环境中会存在很多安全隐患,该文从这些安全隐患入手,做了一些探讨,并且提出了几种解决方案,希望能增强信息管理体系的数据库安全性。 展开更多
关键词 access VB 数据库 信息管理系统 数据安全
在线阅读 下载PDF
基于DataGuard的Oracle RAC高校数据保护研究
16
作者 李茜 《广西民族大学学报(自然科学版)》 CAS 2013年第2期67-71,共5页
数据是高校管理信息化产生的最重要的无形资产,数据的丢失或者损坏都将极大地损害教学、管理和科研工作的正常开展.Oracle RAC是目前使用最为广泛的数据库集群化管理方式,在此基础上开展DataGuard数据保护技术的应用研究,可以弥补集群... 数据是高校管理信息化产生的最重要的无形资产,数据的丢失或者损坏都将极大地损害教学、管理和科研工作的正常开展.Oracle RAC是目前使用最为广泛的数据库集群化管理方式,在此基础上开展DataGuard数据保护技术的应用研究,可以弥补集群数据库环境在数据容灾、备份和故障恢复方面的不足,提升数据的安全性,确保高校各类应用系统的正常运行. 展开更多
关键词 数据保护 dataGUARD 数据安全 数据备份 数据恢复
在线阅读 下载PDF
广播发射台站在数据安全上的运维方式探索
17
作者 刘娜 《网络安全与数据治理》 2026年第1期9-13,共5页
基层广播发射台站数据安全运维的核心痛点在于“有限资源与差异化数据保护需求不匹配”,分类分级备份机制是解决该矛盾的关键技术路径。针对发射台站“数据聚焦设备运行与指令交互”的核心属性,构建“数据安全等级备份技术参数”映射模... 基层广播发射台站数据安全运维的核心痛点在于“有限资源与差异化数据保护需求不匹配”,分类分级备份机制是解决该矛盾的关键技术路径。针对发射台站“数据聚焦设备运行与指令交互”的核心属性,构建“数据安全等级备份技术参数”映射模型,通过备份频率系数、冗余度及RTO达标率优化三类公式计算,并结合基层台站实测数据,验证公式可行性。研究表明,通过量化参数管控,可使一级数据备份成功率、RTO达标率提升至理想的数值,为基层发射台站提供可落地的分类分级备份技术方案。 展开更多
关键词 数据安全运维 分类分级备份 备份频率系数 RTO达标率
在线阅读 下载PDF
基于可搜索加密算法的高性能高可用MySQL数据库自动备份算法
18
作者 路辉 戴志敏 《微型电脑应用》 2026年第1期239-241,245,共4页
MySQL是一种常用的关系型数据库管理系统,为了保证数据的安全性和可靠性,数据库备份是必不可少的。基于此,文章提出一种基于可搜索加密算法的高性能高可用MySQL数据库自动备份算法。传统数据库备份方法存在一些问题,包括备份文件机密性... MySQL是一种常用的关系型数据库管理系统,为了保证数据的安全性和可靠性,数据库备份是必不可少的。基于此,文章提出一种基于可搜索加密算法的高性能高可用MySQL数据库自动备份算法。传统数据库备份方法存在一些问题,包括备份文件机密性不足、备份效率低下、可用性不高等。为了解决这些问题,采用可搜索加密算法对数据库备份文件进行加密,该算法允许在加密状态下进行搜索,保证备份文件的机密性,并允许用户进行关键字搜索。通过所提出的算法使得数据库备份文件可搜索加密,既确保了机密性,又提供了高性能和高可用性的备份方案。测试结果表明,所提出的算法在确保数据安全的同时,还具有较高的备份效率和可用性。 展开更多
关键词 MYSQL数据库 自动备份算法 可搜索加密算法 数据安全 高性能备份
在线阅读 下载PDF
医院信息系统中患者隐私数据保护技术实现路径探讨
19
作者 陆通宇 《信息与电脑》 2026年第2期163-165,共3页
医院信息系统患者隐私数据保护面临技术漏洞、人员管理、外部攻击及法规执行等挑战,存在身份认证薄弱、加密不足、系统漏洞、人员管理意识欠缺、权限混乱等问题。针对这些问题,文章构建涵盖数据加密、访问控制、数据脱敏、安全审计的关... 医院信息系统患者隐私数据保护面临技术漏洞、人员管理、外部攻击及法规执行等挑战,存在身份认证薄弱、加密不足、系统漏洞、人员管理意识欠缺、权限混乱等问题。针对这些问题,文章构建涵盖数据加密、访问控制、数据脱敏、安全审计的关键技术体系,并提出相应实施路径,保障患者隐私数据安全。 展开更多
关键词 医院信息系统 患者隐私数据 数据保护技术 访问控制 安全审计
在线阅读 下载PDF
数据要素流通场景下基于零信任架构的数据安全访问控制系统
20
作者 王宇静 赵雯钰 +2 位作者 谢坤 宾军志 李小森 《电子设计工程》 2026年第3期107-112,共6页
针对网络数据访问的安全性问题,设计了一种基于零信任架构的数据安全访问控制系统。设置身份认证模块、安全服务器程序模块与角色权限认证模块,完善控制系统硬件单元的初步构型;通过对数据双向身份认证机制的定义,实现对信任值的评估,... 针对网络数据访问的安全性问题,设计了一种基于零信任架构的数据安全访问控制系统。设置身份认证模块、安全服务器程序模块与角色权限认证模块,完善控制系统硬件单元的初步构型;通过对数据双向身份认证机制的定义,实现对信任值的评估,完成数据安全访问控制方案的设计。实验结果表明,零信任架构模型能够满足网络主机的实际部署与使用需求,生成属性密钥的时间更短,最低为189 ms,有助于提升网络主机的安全性等级。 展开更多
关键词 数据要素流通 零信任架构 数据安全 访问控制 角色权限 身份认证
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部