期刊文献+

基于区块链技术的安全访问控制机制 被引量:2

Security Access Control Mechanism Based on Blockchain Technology
下载PDF
导出
摘要 针对基于属性的访问控制模型存在的安全性问题,笔者提出了基于区块链技术的安全访问控制机制。该机制将区块链技术与基于属性的访问控制相结合,利用区块链去中心化、分布式等特点,在实现匿名访问控制的基础上实现了访问控制策略管理。分析表明,区块链对策略的存储管理能够防止出现客体资源恶意拒绝访问的情况。 Aiming at the security problems of the attribute-based access control,the paper proposes a secure access control mechanism based on blockchain.This mechanism combines blockchain technology with attribute-based access control,and utilizes the characteristics of blockchain decentralization and distribution to realize the management of access control policies on the basis of achieving anonymous access control.The analysis shows that the blockchain’s storage management of policies can prevent the object resources from maliciously denying access.
作者 刘雪贞 孙从翔 Liu Xuezhen;Sun Congxiang(School of Information Engineering,Jiaozuo University,Jiaozuo Henan 454000,China)
出处 《信息与电脑》 2020年第7期191-193,共3页 Information & Computer
关键词 基于属性的访问控制模型 区块链 策略 去中心化 attribute based access control model blockchain policy decentralization
  • 相关文献

参考文献9

二级参考文献84

  • 1周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:29
  • 2袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 3刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法[J].软件学报,2007,18(8):1958-1967. 被引量:10
  • 4Bonatti P,De Capitani Di Vimercati S,Samarati P.An algebra for composing access control policies[J].ACM Trans on Information and System Security,2002,5(1):1-35.
  • 5Ferraiolo D F,Gavrila S,Hu V,et al.Composing and combining policies under the policy machine[C]//Proc of the 10th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2005:11-20.
  • 6Cheng Xiangran,Chen Xingyuan,Zhang Bin,et al.An algebra for composing access control policies in grid[C]//Proc of International Conference on Computational Intelligence and Security.[S.l.]:IEEE Press,2009:526-530.
  • 7McLean J.The algebra of security[C]//Proc of IEEE Symposium on Security and Privacy.Washinton DC:IEEE Computer Society,1988:2.
  • 8Wijesekera D,Jajodia S.A propositional policy algebra for access control policies composition algebra[J].ACM Trans on Information and System Security,2003,6(2):286-325.
  • 9Bharadwaj V G,Baras J S.Towards automated negotiation of access control policies[C]//Proc of IEEE International Workshop on Policies for Distributed Systems and Networks.Washinton DC:IEEE Computer Society,2003:111.
  • 10付长胜,肖侬,赵英杰,陈涛.基于协商的跨社区访问的动态角色转换机制[J].软件学报,2008,19(10):2754-2761. 被引量:7

共引文献303

同被引文献7

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部