Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Application Research of Computers》 2008-09
Add to Favorite Get Latest Update

Flexible access control policy and its application research

ZHAO Bin1,WANG Ya-di2,HAN Rui-sheng1,LI Li-xin1(1.Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China;2.PLA Information Engineering University,Zhengzhou 450001,China)  
This paper presented a flexible,object-oriented and declarative access control policy,its decision-making algorithm and enforcement framework.Compare to traditional access control policies,it consisted of five components-authorization type,subject,permission,constraint and effect,which made it flexible enough to express a variety of access control requirements.Presented decision-making algorithm and enforcement framework were adaptived to dynamic environment change,and could efficiently satisfy the requirement for distributed application.As an example of such application,also discussed its implementation and application in a distributed campus network system.
【Fund】: 国防预研基金资助项目(9140A26010306JB5201)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 (Institute of Electronic Technology,the PLA Information En-gineering University,Zhengzhou,China 450004)XU You Chen Xingyuan Tang Huilin Gao Peilin;Research On Criterion-based Operating System Security Test And Evaluation Index System[J];;2007-03
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 LIU Wen qing,QING Si han,LIU Hai feng(Engineering Research Center for Information Security Technology,The Chinese Academy of Science,Beijing 100080,China);Study and Implementation of a Multilevel File System in Security Kernel of OS[J];Acta Electronica Sinica;2002-05
2 SHI Jun ①, ZHU Lu Hua ②, SHEN Chang Xiang ③, and YOU Jin Yuan ① ①(Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030) ②(Jiangnan Institute of Computer Technology, Wuxi 214083);A DEDICATED SECURE OPERATING SYSTEM[J];Journal of Computer Research and Development;2002-05
3 Li Jun and Sun Yufang(Institute of Software,Chinese Academy of Sciences,Beijing 100080);COMPUTER SECURITY AND SECURITY MODEL[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;1996-04
4 He HaiyUn; Zhang Chun; Zhao Zhansheng(Graduate School of University of Science and Technology of China, Beijing 100039);Analysis of Role-based Access Control Model[J];COMPUTER ENGINEERING;1999-08
5 LIU Wenqing,LIU Haifeng,QING Sihan (Engineering Research Center for Information Security Technology,Chinese Academy of Science, Beijing 100083);The Research and Implementation of MLS TCP/IP Based on Secure Operating System[J];Computer Engineering;2001-02
6 LIU Wen-qing, QING Si-han, LIU Hai-feng(Engineering Research Center for Information Security Technology, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China);Design of a Modified BLP Security Model and Its Application to SecLinux[J];Journal of Software;2002-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved