[1]张玉静,刘军,李先珠. 带有时间约束支持冲突检测的访问控制模型[J].计算机技术与发展,2015,25(02):117-121.
 ZHANG Yu-jing,LIU Jun,LI Xian-zhu. An Access Control Model of Supporting Conflict Detection with Time Constrains[J].,2015,25(02):117-121.
点击复制

 带有时间约束支持冲突检测的访问控制模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年02期
页码:
117-121
栏目:
智能、算法、系统工程
出版日期:
2015-02-10

文章信息/Info

Title:
 An Access Control Model of Supporting Conflict Detection with Time Constrains
文章编号:
1673-629X(2015)02-0117-05
作者:
 张玉静刘军李先珠
 解放军理工大学 指挥信息系统学院
Author(s):
 ZHANG Yu-jingLIU JunLI Xian-zhu
关键词:
 访问控制时间约束本体策略冲突检测
Keywords:
 access controltime constrainsontologypolicy conflict detection
分类号:
TP31
文献标志码:
A
摘要:
 为确保存储在系统中的访问策略都是无冲突的,提高策略冲突检测的效率,使系统能够正确有效的运行,将本体的概念应用到访问控制中,提出了一种基于本体的支持策略冲突检测的访问控制模型,并对该模型中的核心模块—策略冲突检测模块进行了详细说明。在此基础上,为使系统中的授权具有时效性,更加符合实际应用,将时间特征引入模型,根据时间约束的特征,将资源分为4类,细化了资源的类别,增强了系统授权的能力。最后,针对这4类资源的访问控制,给出了模型的时间约束算法。
Abstract:
 In order to ensure the policies stored in the system are conflict-free,to improve the efficiency of strategy conflict detection and make the system operated correctly and effectively,apply the concept of ontology into the access control and propose an ontology-based access control model of supporting policy conflict detection,and has described policy detection engine in detail which is the core of the model. On this basis,the model has introduced the time constrains to make the system of authorization has timeliness. Then the resources can be divided into 4 categories according to the characters of the time constrains for corresponding to the reality,enhancing the capability of system authorization. Finally,propose a time constrains algorithm for this model according to the access control of four resource.

相似文献/References:

[1]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(02):170.
[2]程春玲 张登银.实现DRM系统的一种新方案[J].计算机技术与发展,2009,(07):166.
 CHENG Chun-ling,ZHANG Deng-yin.A New Implementation Scheme for Secure DRM System[J].,2009,(02):166.
[3]李秋敬 刘广亮 谢圣献 张沙沙 段海霞 许宏伟.基于时间约束的角色访问控制模型研究[J].计算机技术与发展,2009,(08):162.
 LI Qiu-jing,LIU Gang-liang,XIE Sheng-xian,et al.Temporal Role- Based Access Control Model[J].,2009,(02):162.
[4]刘宏波 罗锐 王永斌.一种采用RBAC模型的权限体系设计[J].计算机技术与发展,2009,(09):154.
 LIU Hong-bo,LUO Rui,WANG Yong-bin.Competence System Based on RBAC Design and Implementation[J].,2009,(02):154.
[5]杨灿 汤圣博 黄辉泽.企业级P2P视频会议系统设计与实现[J].计算机技术与发展,2009,(09):186.
 YANG Can,TANG Sheng-bo,HUANG Hui-ze.Design and Implementaion of Enterprise Video Conference System Based on P2P[J].,2009,(02):186.
[6]王立 万世昌 张珍.基于互信属性调配机制的访问控制模型[J].计算机技术与发展,2009,(12):127.
 WANG Li,WAN Shi-chang,ZI-IANG Zhen.Model for Mutual Trust Attribute Deployment Mechanism Based Access Control[J].,2009,(02):127.
[7]周光明 赵莉莉 彭长根.基于SOA和PKI/PMI的访问控制方案[J].计算机技术与发展,2009,(04):170.
 ZHOU Guang-ming,ZHAO Li-li,PENG Chang-gen.Access Control Systems Based on SOA and PKI/PMI[J].,2009,(02):170.
[8]张翼飞 徐蕾.一种矩阵型组织模式下的访问控制模型[J].计算机技术与发展,2009,(04):180.
 ZHANG Yi-fei,XU Lei.An Access Control Model under Matrix Organization[J].,2009,(02):180.
[9]朱益霞 孙道清 沈展.一种普适计算下的访问控制策略[J].计算机技术与发展,2010,(08):91.
 ZHU Yi-xia,SUN Dao-qing,SHEN Zhan.An Access Control Scheme for Pervasive Computing[J].,2010,(02):91.
[10]夏启寿[] 殷晓玲[] 范训礼.基于时间角色访问控制授权模型的研究[J].计算机技术与发展,2008,(11):138.
 XIA Qi-shou,YIN Xiao-ling,FAN Xun-li.Research on Authorization Model Based on Time RBAC[J].,2008,(02):138.
[11]胡欣杰,路川. 基于访问控制的涉密信息管理安全解决方案[J].计算机技术与发展,2014,24(08):131.
 HU Xin-jie,LU Chuan. A Solution for Management Security of Secret Information Based on Access Controlling[J].,2014,24(02):131.
[12]郝小龙. 改进的RBAC模型在电网视频监控平台中的应用[J].计算机技术与发展,2014,24(12):212.
 HAO Xiao-long. Application of Improved RBAC Model in Grid Video Monitoring Platform[J].,2014,24(02):212.
[13]尹安. 舰船内部信息综合管理平台的设计研究与开发[J].计算机技术与发展,2015,25(05):152.
 YIN An. Design Research and Development of Ship inside Information Integrated Management Platform[J].,2015,25(02):152.
[14]付雄[],徐松[],周代明[]. 云计算环境下基于信任的访问控制模型研究[J].计算机技术与发展,2015,25(09):139.
 FU Xiong[],XU Song[],ZHOU Dai-ming[]. Research on Trust-based Access Control Model in Cloud Computing Environment[J].,2015,25(02):139.
[15]王剑[],吴定峰[],阚京[],等. 面向农业信息服务的单点登录技术研究与改进[J].计算机技术与发展,2016,26(05):191.
 WANG Jian[],WU Ding-feng[],KAN Jing[],et al. Design and Improvement of Single Sign-on Technology for Agriculture Information Services[J].,2016,26(02):191.
[16]尚福华,李盼. 面向射孔数据协作的文件授权访问控制模型[J].计算机技术与发展,2016,26(09):119.
 SHANG Fu-hua,LI Pan. File Authorization Access Control Model for Perforated Data Collaboration[J].,2016,26(02):119.
[17]陈彦竹,郝天曙. 基于角色信任度动态监控的访问控制研究[J].计算机技术与发展,2017,27(10):106.
 CHEN Yan-zhu,HAO Tian-shu. Research on Access Control of Dynamic Monitoring with Role Trustrank[J].,2017,27(02):106.
[18]范迪,朱志祥. 一种Dubbo框架的授权认证方案[J].计算机技术与发展,2017,27(11):115.
 FAN Di,ZHU Zhi-xiang. An Authorization Authentication Scheme for Dubbo Framework[J].,2017,27(02):115.

更新日期/Last Update: 2015-04-28