帮助 关于我们

返回检索结果

访问控制模型研究进展及发展趋势
Research Status and Development Trends of Access Control Model

查看参考文献78篇

李凤华 1   苏铓 1   史国振 2   马建峰 1  
文摘 访问控制的任务是保证信息资源不被非法使用和访问,冲突检测与消解主要解决不同信息系统安全策略不统一的问题.随着计算机和网络通信技术的发展,先后出现了自主访问控制模型、强制访问控制模型、基于角色的访问控制模型、基于任务的访问控制模型、面向分布式和跨域的访问控制模型、与时空相关的访问控制模型以及基于安全属性的访问控制模型等访问控制模型.本文从理论和应用研究两个角度分析和总结了现有访问控制技术、访问控制策略冲突检测与消解方法的研究现状,提出了目前访问控制模型及其冲突检测与消解研究在面向信息物理社会的泛在网络互联环境中存在的问题,并给出了细粒度多级安全的访问控制模型及其策略可伸缩调整方法的发展趋势.
其他语种文摘 The main task of access control is to prevent unauthorized accesses to information resources.Conflict detection and resolution mainly solves problems caused by various security policies among different information systems.With the development of computer and communication technology,several access control models have appeared such as discretionary access control,mandatory access control,role based access control,task-based access control,access control for distributed environment and cross-domain,spatiotemporal attribute based access control and security attribute based access control,etc.The paper analyzes and summarizes the existing domestic and international research situation in the field of access control and conflict detection and resolution from the theoretical research and application aspects,indicates exiting problems in ubiquitous networks for the cyber-physical society,and points out some development trends of fine-grained and multi-level security access control model and scalable method for its policy.
来源 电子学报 ,2012,40(4):805-813 【核心库】
DOI 10.3969/j.issn.0372-2112.2012.04.030
关键词 访问控制 ; 冲突检测 ; 研究现状 ; 发展趋势
地址

1. 西安电子科技大学, 计算机网络与信息安全教育部重点实验室, 陕西, 西安, 710071  

2. 北京电子科技学院电子信息工程系, 北京, 100070

语种 中文
文献类型 综述型
ISSN 0372-2112
学科 自动化技术、计算机技术
基金 国家自然科学基金 ;  国家教育部重点项目 ;  北京市自然科学基金 ;  新闻出版重大科技工程项目-数字版权保护技术研发工程
文献收藏号 CSCD:4544673

参考文献 共 78 共4页

1.  Ferraiolo D F. Role-based access control. Proceedings of the 15th National Computer Security Conference,1992:554-563 CSCD被引 6    
2.  Sandhu R. Role-based access control models. IEEE Computer,1996,29(2):38-47 CSCD被引 599    
3.  Sandhu R. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security,1999,2(1):105-135 CSCD被引 76    
4.  Sandhu R. The ARBAC99 model for administration of roles. Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99),1999:229-238 CSCD被引 1    
5.  Oh S. An effective role administration model using organization structure. ACM Transactions on Information and System Security,2006,9(2):113-137 CSCD被引 7    
6.  Ferraiolo D F. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security,2001,4(3):224-274 CSCD被引 241    
7.  Ma J. Risk analysis in access control systems. Proceedings of the Eighth Annual International Conference on Privacy,Security and Trust,2010:160-166 CSCD被引 1    
8.  Pang C Y. Managing RBAC States with transitive relations. Proceedings of the 2nd ACM symposium on Information,computer and communications security (ASIACCS'07),2007:139-148 CSCD被引 1    
9.  Thomas R. Task-based authorization controls (TBAC):A Family of models for active and enterprise oriented authorization management. Proceedings of the 11th IFIP WG11.3 Conference on Database Security,1997:166-181 CSCD被引 1    
10.  Coulouris G. Role and task-based access control in the PerDiS groupware platform. Proceedings of the 3rd ACM Workshop Role-Based Access Control,1998:115-121 CSCD被引 1    
11.  邓集波. 基于任务的访问控制模型. 软件学报,2003,14(1):76-81 CSCD被引 82    
12.  Sejong O. Task-role-based access control model. Information System,2003(28):533-562 CSCD被引 2    
13.  朱君. 角色协同中群体感知和访问控制技术研究. 计算机软件与理论博士学位论文,2009 CSCD被引 1    
14.  Bertino E. The specification and enforcement of authorization constraints in workflow management systems. ACM Transaction on Information System Security,1999,2(1):65-104 CSCD被引 38    
15.  Knorr K. Dynamic access control through Petri net workflows. Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00),2000:159-167 CSCD被引 1    
16.  Botha R. Designing role hierarchies for access control in workflow systems. Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development (COMPSAC'01),2001:117-122 CSCD被引 1    
17.  Sun Y Q. Flexible workflow incorporated with RBAC. Proceedings of the 9th International Conference in Computer Supported Cooperative Work in Design (CSCWD'05). LNCS 3865,2005:525-534 CSCD被引 1    
18.  Thomas R. Team-based access control (TMAC):A primitive for applying role-based access controls in collaborative environments. Proceedings of 2nd ACM Workshop on Role-based Access Control,1997:13-19 CSCD被引 3    
19.  Alotaiby F T. A model for Team-based access control (TMAC 2004). Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC'04),2004:450-454 CSCD被引 1    
20.  Zhang C N. An Object-oriented RBAC model for distributed system. Proceedings of the Working IEEE/IFIP Conference on Software Architecture (WICSA'01),2001:24-32 CSCD被引 1    
引证文献 41

1 张立臣 面向普适计算的自适应模糊访问控制方法 计算机工程与应用,2012,48(27):7-11,16
CSCD被引 0 次

2 张立臣 普适计算环境下基于模糊ECA规则的访问控制方法 计算机科学,2013,40(2):78-83
CSCD被引 2

显示所有41篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号