期刊文献+

基于属性的内部文档访问控制

Access control for private file access based on attribute
下载PDF
导出
摘要 采用基于属性的访问控制模型思想,实现了分布式环境下的内部文档访问控制。采用F-Logic语言,描述了访问控制策略,具有良好的结构化知识的描述能力。采用FLORA-2作为逻辑推理引擎,具有更好的通用性。在统一的访问控制框架下,以具体应用为例,描述了基于属性的内部文档访问控制实现过程中的各个要素,包括属性描述、访问控制请求描述、策略描述。 Attribute based access control (ABAC) model is applied to solve the private file access control, which is in a distributed environment, applies F-Logic language, which is more suitable for the structured knowledge, to describe the elements of policy and applies FLORA-2, which has more generality, to work as a logic engine. In a uniform access control architecture, how to implement elements of attribute based private file access control is provided by using an example from a actual requirement, including attribute description, access control request description and Policy description.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第5期1045-1047,1067,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA01Z471)。
关键词 内部文档 属性 访问控制 F-Logic 策略 private file attribute access control F-Logic policy
  • 相关文献

参考文献8

  • 1林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 2Yuan E,Tong J.Attributed based access control (ABAC) for web services [C]. IEEE International Conference on Web Services, 2005:561-569.
  • 3LI N,MITCHELL J C,Winsborough W H.Design of a role-based trust management framework[C].Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press,2002.
  • 4RYUTOV T.The condition-driven authorization model for distributed system services[D]. PhD Thesis, University of Southern California, 2002.
  • 5Kifer M,Lausen G,Wu J.Logical foundations of object-oriented and frame-based languages [J]. Journal of the ACM, 1995,42: 741-843.
  • 6Yang G,Kifer M,Zhao C,et al.FLORA-2:User's manual(Version 0.94)[M]. http://flora.sourceforge.net.
  • 7Winsborough W H, SEAMONS K E, JONES V E. Automated trust negotiation[C].DARPA Information Survivability Conference and Exposition. IEEE Press,2000:88-102.
  • 8ABDUL-RAHMAN A,HAILES S.A distributed trust model[C]. Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998:48-60.

二级参考文献1

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部