期刊文献+

基于证据的代码访问控制机制研究

Research on Code Access Control Model Based on Evidence
下载PDF
导出
摘要 随着分布式计算的不断发展,传统的基于角色的安全性(RBAC)模型已无法满足分布式安全的要求,该文根据微软的代码访问安全性,归纳出基于证据的代码访问控制(EBCAC)模型和它的一种形式化描述,该模型能实现对系统更低层次的访问控制;提出了一种改进的基于证据的代码访问控制系统设计方案,给出了防止引诱攻击的实例。 With the development of the distributed computing, traditional role-based access control model doesn't meet the demand of distributed computing security any more. An evidence-based code access control(EBCAC) model, which can provide the lower access control of system security, is generalized from code access control of Microsoft in this paper. It gives a formalized description and describes an improved system architecture based on it. It also discusses how to implement and gives an instance of EBCAC model.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第13期161-163,167,共4页 Computer Engineering
关键词 分布式网络安全 访问控制 引诱攻击 distributed network security access control luring attack
  • 相关文献

参考文献6

二级参考文献14

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 6[1]Ravi S Sandhu,Edward J Coyne,Hal L Feinstein et al. Role-based access control models. IEEE Computer,1996.2
  • 7[2]R Fielding. Hypertext Transfer Protocol-HT TP/1.1[S].RFC 2068,1997
  • 8[3]D Kristol. HTTP State Management Mechanism[S].RFC 2965,2000
  • 9[4]R Rivest.The MD5 Message-Digest Algorithm[S].RFC 1321,1992.4
  • 10Sondhu R S, Coyne Ei, FeiMtein H L, Youman C E. Role-Based Access control Models. IEEE Computer, 1996,29 ( 2 ) : 38-47.

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部