期刊文献+

访问控制技术研究 被引量:3

Research of access control technology
下载PDF
导出
摘要 访问控制是信息安全的重要组成部分。本文分析了访问控制的主要技术:自主访问控制技术(DAC)、强制访问控制技术(MAC)和基于角色的访问控制技术(RBAC),其中重点讨论分析了RBAC,并对每种访问控制技术进行了优缺点分析总结。 Access Control is an important component of information security.This paper analyses the primary Access Control technology: Discretionary Access Control technology (DAC), Mandatory Access Control technology (MAC)and Role-Based Access Control technology (RBAC),then emphatically discusses RBAC.Finally the advantage and disadvantage of each Access Control technology are expatiated.
作者 刘伟
出处 《农业网络信息》 2007年第7期96-97,共2页 Agriculture Network Information
关键词 角色 自主访问控制 强制访问控制 基于角色的访问控制 Role Discretionary access control Mandatory access control Role-based access control
  • 相关文献

参考文献3

二级参考文献25

  • 1Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 2David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 3Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 4Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 5Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.
  • 6Ahn GJ, Arvisandhu. Role-based Authorization Constrains Specification [ J]. ACM Transcations on Information and System Security,2002, ( 3 ) :207-226.
  • 7Bertino E, Bonatti P A, Ferrari E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security, August 2001,4(3) : 191-233.
  • 8Ahn G, Sandhu R. Role-based authorization constraints specification[J]. ACM Transactions on Information and System Security, November 2000,3(4):207 - 226.
  • 9Ferraiolo D F, Sandhu R, Gavrila S, Kuhn D R, Chandramouli R. Proposed NIST standard for role-based access control [J].ACM Transactions on Information and System Security (TISSEC) 2001, 4(3), August 224 - 274.
  • 10Jensen K. Coloured petri nets: basic concepts, analysis methods and practical use[M], Volume 1, Springer Verlag, 1997.

共引文献73

同被引文献15

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部