期刊文献+

一种四维访问矩阵模型的建立 被引量:2

Establishment of four-dimension access matrix model
下载PDF
导出
摘要 传统的主体—客体访问矩阵模型缺少对动态因素的描述,故应用在刻画系统中具体的资源访问活动时存在着许多不足,如无法实现“最小特权”原则和缺乏对访问授权时间特性的控制。引入可执行程序及时间两维,提出的四维访问控制模型很好地弥补了上述的不足。 Because of lacking something to discribe dynamic characters,the traditional Subject-object access matrix model has lots of bugs in characterization of some access to resource of real system.For example:it can’t implement the principle of least privilege or has less control on time character of access privilege.After setting up two dimensions of executable program and time, a four-dimension access mutrix model come into being based on which the bugs refered to above were removed.
出处 《计算机工程与设计》 CSCD 2004年第5期668-670,707,共4页 Computer Engineering and Design
基金 国家863高技术计划基金(2001AA144010)
关键词 访问矩阵模型 可执行程序 时间 自主访问控制 强制访问控制 信息安全 access matrix discretionary access control mandatorv access control
  • 相关文献

参考文献4

  • 1National computer security center of america department of defense [Z]. Trusted Computer System Evaluation Criteria,CSC-STD-001-83, 1983.
  • 2LaPadula L. Secure computer systems: A Mathematical model [R]. An Electronic Reconstruction of the Original MITRE Technical Report 2547, Volume Ⅱ, 1996.
  • 3董光宇,卿斯汉,刘克龙.带时间特性的角色授权约束[J].软件学报,2002,13(8):1521-1527. 被引量:51
  • 4Leonard J LaPadula, Elliott Bell D.Secure computer systems:Mathematical foundations [R]. MITRE Technical Report 2547, Volume Ⅱ, 1973.

二级参考文献5

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.

共引文献50

同被引文献13

引证文献2

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部