期刊文献+

空间数据访问控制研究 被引量:6

Study on Access Control for Spatial Data
下载PDF
导出
摘要 空间数据安全,尤其是访问控制在GIS应用(特别是网络应用)中已经成为不可或缺的功能部件。该文主要讨论设计和实现空间数据访问控制功能所涉及的基本问题,包括空间数据访问控制分类、空间数据访问控制的要求、空间数据访问控制模型、授权规则的存储结构和管理方式、授权规则与访问请求的匹配决策算法以及空间数据访问控制的实现策略等。提出一种空间数据访问控制的参考框架,定义了各组件的功能,并解释访问控制功能的实现流程。 Spatial data security, especially access control, has become an indispensable function component in the practical applieation of GIS, especially in network environment. This paper mainly diseusses several fundamental issues eoneerning the design and implementation of access control mechanism for spatial data, including the categories, requirements, authorization models, storage structures and management methods of authorization rules, matching and decision algorithm between authorization rule and access request, and its implementation policies etc. Finally, based on the content above, a reference framework of spatial data access control is proposed and its procedures are explained.
出处 《地理与地理信息科学》 CSCD 北大核心 2008年第2期9-13,共5页 Geography and Geo-Information Science
基金 国家863计划资助项目(2006AA12Z201)
关键词 空间数据 访问控制 授权模型 授权规则 策略RBAC spatial data access control authorization model authorization rule policy RBAC
  • 相关文献

参考文献12

  • 1United Nations Economic and Social Commission for Asia and the Paeifie(UNESCAP). GIS Standards and Standardization: A Handbook[M]. New York:United Nations, 1998. 1-3.
  • 2OH Y H,BAE H Y. MLS/SDM:Multi-level secure spatial data model[A]. LAGANA A,GAVRILOVA M L Computational Science and Its Applications - ICCSA 2004[C]. Berlin: Springer,2004. 222-229.
  • 3CHUN S A,ATLURI V. Protecting privacy from continuous high -resolution satellite surveillance[A]. THURAISINGHAM B, RIET R Data and Application Security Developments and Direetions[C]. Boston: Springer, 2002. 233-244.
  • 4MATHEUS A. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure[A]. FERRARI E, AHN G J. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies[C]. New York: ACM, 2005. 21- 28.
  • 5SHEKHAR S, CHAWLA S. Spatial Databases: A Tour[M]. New Jersey: Prentice Hall, 2003.
  • 6BERTINO E, CATANIA B, PERLASCA P. GEO- RBAC: A spatially aware RBAC[A]. FERRARI E, AHN G J. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies[C]. New York: ACM, 2006.1 - 34.
  • 7SANDHU R S, SAMARATIY P. Access control: Principles and practice[J]. IEEE Communications Magazine, 1994(9) : 40-48.
  • 8OASIS. eXtensible Access Control Markup Language (XACML) Version 2. 0[EB/OL]. http://does.oasis-open.org/xaeml/2. 0/access_control- xaeml- 2.0- core- spec- os. pdf, 2007 - 09 -30.
  • 9LEE A.传统的访问控制[EB/OL].http://www.cnblogs.com/adylee/archive/2007/11/21/967552.html,2007-11-21.
  • 10SASAOKAL L K, MEDEIROS C B. Access Control in Geographic Databases[A]. RODDICK J F, BENJAMINS V R. Advances in Conceptual Modeling-Theory and Practice[C]. Berlin: Springer, 2006. 110-119.

二级参考文献6

共引文献76

同被引文献86

引证文献6

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部