访问控制模型研究进展及发展趋势
Research Status and Development Trends of Access Control Model
查看参考文献78篇
文摘
|
访问控制的任务是保证信息资源不被非法使用和访问,冲突检测与消解主要解决不同信息系统安全策略不统一的问题.随着计算机和网络通信技术的发展,先后出现了自主访问控制模型、强制访问控制模型、基于角色的访问控制模型、基于任务的访问控制模型、面向分布式和跨域的访问控制模型、与时空相关的访问控制模型以及基于安全属性的访问控制模型等访问控制模型.本文从理论和应用研究两个角度分析和总结了现有访问控制技术、访问控制策略冲突检测与消解方法的研究现状,提出了目前访问控制模型及其冲突检测与消解研究在面向信息物理社会的泛在网络互联环境中存在的问题,并给出了细粒度多级安全的访问控制模型及其策略可伸缩调整方法的发展趋势. |
其他语种文摘
|
The main task of access control is to prevent unauthorized accesses to information resources.Conflict detection and resolution mainly solves problems caused by various security policies among different information systems.With the development of computer and communication technology,several access control models have appeared such as discretionary access control,mandatory access control,role based access control,task-based access control,access control for distributed environment and cross-domain,spatiotemporal attribute based access control and security attribute based access control,etc.The paper analyzes and summarizes the existing domestic and international research situation in the field of access control and conflict detection and resolution from the theoretical research and application aspects,indicates exiting problems in ubiquitous networks for the cyber-physical society,and points out some development trends of fine-grained and multi-level security access control model and scalable method for its policy. |
来源
|
电子学报
,2012,40(4):805-813 【核心库】
|
DOI
|
10.3969/j.issn.0372-2112.2012.04.030
|
关键词
|
访问控制
;
冲突检测
;
研究现状
;
发展趋势
|
地址
|
1.
西安电子科技大学, 计算机网络与信息安全教育部重点实验室, 陕西, 西安, 710071
2.
北京电子科技学院电子信息工程系, 北京, 100070
|
语种
|
中文 |
文献类型
|
综述型 |
ISSN
|
0372-2112 |
学科
|
自动化技术、计算机技术 |
基金
|
国家自然科学基金
;
国家教育部重点项目
;
北京市自然科学基金
;
新闻出版重大科技工程项目-数字版权保护技术研发工程
|
文献收藏号
|
CSCD:4544673
|
参考文献 共
78
共4页
|
1.
Ferraiolo D F. Role-based access control.
Proceedings of the 15th National Computer Security Conference,1992:554-563
|
CSCD被引
6
次
|
|
|
|
2.
Sandhu R. Role-based access control models.
IEEE Computer,1996,29(2):38-47
|
CSCD被引
599
次
|
|
|
|
3.
Sandhu R. The ARBAC97 model for role-based administration of roles.
ACM Transactions on Information and System Security,1999,2(1):105-135
|
CSCD被引
76
次
|
|
|
|
4.
Sandhu R. The ARBAC99 model for administration of roles.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99),1999:229-238
|
CSCD被引
1
次
|
|
|
|
5.
Oh S. An effective role administration model using organization structure.
ACM Transactions on Information and System Security,2006,9(2):113-137
|
CSCD被引
7
次
|
|
|
|
6.
Ferraiolo D F. Proposed NIST standard for role-based access control.
ACM Transactions on Information and System Security,2001,4(3):224-274
|
CSCD被引
241
次
|
|
|
|
7.
Ma J. Risk analysis in access control systems.
Proceedings of the Eighth Annual International Conference on Privacy,Security and Trust,2010:160-166
|
CSCD被引
1
次
|
|
|
|
8.
Pang C Y. Managing RBAC States with transitive relations.
Proceedings of the 2nd ACM symposium on Information,computer and communications security (ASIACCS'07),2007:139-148
|
CSCD被引
1
次
|
|
|
|
9.
Thomas R. Task-based authorization controls (TBAC):A Family of models for active and enterprise oriented authorization management.
Proceedings of the 11th IFIP WG11.3 Conference on Database Security,1997:166-181
|
CSCD被引
1
次
|
|
|
|
10.
Coulouris G. Role and task-based access control in the PerDiS groupware platform.
Proceedings of the 3rd ACM Workshop Role-Based Access Control,1998:115-121
|
CSCD被引
1
次
|
|
|
|
11.
邓集波. 基于任务的访问控制模型.
软件学报,2003,14(1):76-81
|
CSCD被引
82
次
|
|
|
|
12.
Sejong O. Task-role-based access control model.
Information System,2003(28):533-562
|
CSCD被引
2
次
|
|
|
|
13.
朱君.
角色协同中群体感知和访问控制技术研究. 计算机软件与理论博士学位论文,2009
|
CSCD被引
1
次
|
|
|
|
14.
Bertino E. The specification and enforcement of authorization constraints in workflow management systems.
ACM Transaction on Information System Security,1999,2(1):65-104
|
CSCD被引
38
次
|
|
|
|
15.
Knorr K. Dynamic access control through Petri net workflows.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00),2000:159-167
|
CSCD被引
1
次
|
|
|
|
16.
Botha R. Designing role hierarchies for access control in workflow systems.
Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development (COMPSAC'01),2001:117-122
|
CSCD被引
1
次
|
|
|
|
17.
Sun Y Q. Flexible workflow incorporated with RBAC.
Proceedings of the 9th International Conference in Computer Supported Cooperative Work in Design (CSCWD'05). LNCS 3865,2005:525-534
|
CSCD被引
1
次
|
|
|
|
18.
Thomas R. Team-based access control (TMAC):A primitive for applying role-based access controls in collaborative environments.
Proceedings of 2nd ACM Workshop on Role-based Access Control,1997:13-19
|
CSCD被引
3
次
|
|
|
|
19.
Alotaiby F T. A model for Team-based access control (TMAC 2004).
Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC'04),2004:450-454
|
CSCD被引
1
次
|
|
|
|
20.
Zhang C N. An Object-oriented RBAC model for distributed system.
Proceedings of the Working IEEE/IFIP Conference on Software Architecture (WICSA'01),2001:24-32
|
CSCD被引
1
次
|
|
|
|
|