[1]胡欣杰,路川. 基于访问控制的涉密信息管理安全解决方案[J].计算机技术与发展,2014,24(08):131-134.
 HU Xin-jie,LU Chuan. A Solution for Management Security of Secret Information Based on Access Controlling[J].,2014,24(08):131-134.
点击复制

 基于访问控制的涉密信息管理安全解决方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年08期
页码:
131-134
栏目:
安全与防范
出版日期:
2014-08-10

文章信息/Info

Title:
 A Solution for Management Security of Secret Information Based on Access Controlling
文章编号:
1673-629X(2014)08-0131-04
作者:
 胡欣杰路川
 装备学院 信息装备系
Author(s):
 HU Xin-jieLU Chuan
关键词:
 访问控制数据库应用程序信息安全
Keywords:
 access controldatabase applications programinformation security
分类号:
TP301
文献标志码:
A
摘要:
 将涉密信息放入共享的数据库中保存必须解决其安全问题,访问控制是一种基本方法。文中首先分析了自主访问控制、强制访问控制、基于角色的访问控制这三种经典的访问控制模型,然后分析了涉密信息本身的特点及其操作管理的需求,并考虑了数据库应用程序中的主体、客体等因素,最后提出并设计了一个综合利用这些策略管理涉密信息的实现方案。该方案设计了几个数据库表,分别保存实现这三种访问控制模型所需的信息和各种类型的涉密信息,给出了这些信息之间的相互关系,划分了程序模块及其实现方案。该方案符合理论要求,切实可行。
Abstract:
 Classified information to be included in the shared database must solve the security problem,access control is a kind of basic method. First,analyze the three classical access control models which are discretionary access control,mandatory access control and role-based access control,then analyze the characteristics of secret information and the requirements of operational management,considering the subject,object and other factors in a database application. Finally,propose and design a realizing scheme which comprehensively uses these strategies to manage classified information in database applications. The scheme designs several database table which to save the in-formation needed and various types of classified information to achieve these three access control model. The relationship between the in-formation is presented,dividing the program module and its implementation scheme. The scheme is practicable.

相似文献/References:

[1]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(08):170.
[2]程春玲 张登银.实现DRM系统的一种新方案[J].计算机技术与发展,2009,(07):166.
 CHENG Chun-ling,ZHANG Deng-yin.A New Implementation Scheme for Secure DRM System[J].,2009,(08):166.
[3]李秋敬 刘广亮 谢圣献 张沙沙 段海霞 许宏伟.基于时间约束的角色访问控制模型研究[J].计算机技术与发展,2009,(08):162.
 LI Qiu-jing,LIU Gang-liang,XIE Sheng-xian,et al.Temporal Role- Based Access Control Model[J].,2009,(08):162.
[4]刘宏波 罗锐 王永斌.一种采用RBAC模型的权限体系设计[J].计算机技术与发展,2009,(09):154.
 LIU Hong-bo,LUO Rui,WANG Yong-bin.Competence System Based on RBAC Design and Implementation[J].,2009,(08):154.
[5]杨灿 汤圣博 黄辉泽.企业级P2P视频会议系统设计与实现[J].计算机技术与发展,2009,(09):186.
 YANG Can,TANG Sheng-bo,HUANG Hui-ze.Design and Implementaion of Enterprise Video Conference System Based on P2P[J].,2009,(08):186.
[6]王立 万世昌 张珍.基于互信属性调配机制的访问控制模型[J].计算机技术与发展,2009,(12):127.
 WANG Li,WAN Shi-chang,ZI-IANG Zhen.Model for Mutual Trust Attribute Deployment Mechanism Based Access Control[J].,2009,(08):127.
[7]周光明 赵莉莉 彭长根.基于SOA和PKI/PMI的访问控制方案[J].计算机技术与发展,2009,(04):170.
 ZHOU Guang-ming,ZHAO Li-li,PENG Chang-gen.Access Control Systems Based on SOA and PKI/PMI[J].,2009,(08):170.
[8]张翼飞 徐蕾.一种矩阵型组织模式下的访问控制模型[J].计算机技术与发展,2009,(04):180.
 ZHANG Yi-fei,XU Lei.An Access Control Model under Matrix Organization[J].,2009,(08):180.
[9]朱益霞 孙道清 沈展.一种普适计算下的访问控制策略[J].计算机技术与发展,2010,(08):91.
 ZHU Yi-xia,SUN Dao-qing,SHEN Zhan.An Access Control Scheme for Pervasive Computing[J].,2010,(08):91.
[10]夏启寿[] 殷晓玲[] 范训礼.基于时间角色访问控制授权模型的研究[J].计算机技术与发展,2008,(11):138.
 XIA Qi-shou,YIN Xiao-ling,FAN Xun-li.Research on Authorization Model Based on Time RBAC[J].,2008,(08):138.
[11]郝小龙. 改进的RBAC模型在电网视频监控平台中的应用[J].计算机技术与发展,2014,24(12):212.
 HAO Xiao-long. Application of Improved RBAC Model in Grid Video Monitoring Platform[J].,2014,24(08):212.
[12]张玉静,刘军,李先珠. 带有时间约束支持冲突检测的访问控制模型[J].计算机技术与发展,2015,25(02):117.
 ZHANG Yu-jing,LIU Jun,LI Xian-zhu. An Access Control Model of Supporting Conflict Detection with Time Constrains[J].,2015,25(08):117.
[13]尹安. 舰船内部信息综合管理平台的设计研究与开发[J].计算机技术与发展,2015,25(05):152.
 YIN An. Design Research and Development of Ship inside Information Integrated Management Platform[J].,2015,25(08):152.
[14]付雄[],徐松[],周代明[]. 云计算环境下基于信任的访问控制模型研究[J].计算机技术与发展,2015,25(09):139.
 FU Xiong[],XU Song[],ZHOU Dai-ming[]. Research on Trust-based Access Control Model in Cloud Computing Environment[J].,2015,25(08):139.
[15]王剑[],吴定峰[],阚京[],等. 面向农业信息服务的单点登录技术研究与改进[J].计算机技术与发展,2016,26(05):191.
 WANG Jian[],WU Ding-feng[],KAN Jing[],et al. Design and Improvement of Single Sign-on Technology for Agriculture Information Services[J].,2016,26(08):191.
[16]尚福华,李盼. 面向射孔数据协作的文件授权访问控制模型[J].计算机技术与发展,2016,26(09):119.
 SHANG Fu-hua,LI Pan. File Authorization Access Control Model for Perforated Data Collaboration[J].,2016,26(08):119.
[17]陈彦竹,郝天曙. 基于角色信任度动态监控的访问控制研究[J].计算机技术与发展,2017,27(10):106.
 CHEN Yan-zhu,HAO Tian-shu. Research on Access Control of Dynamic Monitoring with Role Trustrank[J].,2017,27(08):106.
[18]范迪,朱志祥. 一种Dubbo框架的授权认证方案[J].计算机技术与发展,2017,27(11):115.
 FAN Di,ZHU Zhi-xiang. An Authorization Authentication Scheme for Dubbo Framework[J].,2017,27(08):115.

更新日期/Last Update: 2015-03-26