[1]尚福华,李盼. 面向射孔数据协作的文件授权访问控制模型[J].计算机技术与发展,2016,26(09):119-123.
 SHANG Fu-hua,LI Pan. File Authorization Access Control Model for Perforated Data Collaboration[J].,2016,26(09):119-123.
点击复制

 面向射孔数据协作的文件授权访问控制模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年09期
页码:
119-123
栏目:
安全与防范
出版日期:
2016-09-10

文章信息/Info

Title:
 File Authorization Access Control Model for Perforated Data Collaboration
文章编号:
1673-629X(2016)09-0119-05
作者:
 尚福华李盼
 东北石油大学 计算机与信息技术学院
Author(s):
 SHANG Fu-hua LI Pan
关键词:
 协同环境动态授权文件共享访问控制
Keywords:
 collaborative environmentdynamic authorizationfile sharingaccess control
分类号:
TP31
文献标志码:
A
摘要:
 适当的访问控制机制是支持协作系统正常运行的一项关键技术。建立适当的授权策略在协作系统中是有困难的,往往将传统的授权机制模型应用在协作系统中,不能为多用户之间提供足够的支持。针对射孔校深数据协同处理平台,结合射孔数据协同处理的动态过程,提出一种支持协作的文件授权访问控制模型,使其更适合于协同工作环境的访问控制。重点分析了多用户之间的动态授权机制,采用文件信任评价机制保证权限文件的安全性,基于Hash-索引数据库,保证权限文件在协作系统中的唯一性。介绍了文件授权访问控制模型各组件的构成及具体应用。在该模型中,用户权限值会随着其他多个用户授权而动态变化,用户能够通过对权限文件进行信任评价来防止恶意分享文件,获取其权限。
Abstract:
 Appropriate access control mechanism is a key technology to support the normal operation of the collaborative work system. Construction of the appropriate authorization mechanism is very challenging for the cooperative system. The traditional access control sys-tem applied to the direct cooperation model is not enough for collaboration support among multiple users. In view of the dynamic process of the deep data processing platform and the collaborative process of perforating data,a file authorization access control model is proposed which supports collaboration,to make it more suitable for access control in collaborative work environment. It focuses on the analysis of the dynamic authorization mechanism between multi users in this paper,using the file trust evaluation mechanism to ensure the security of access files. Based on the Hash-index database,the uniqueness of the document in the collaborative system is ensured. The structure of file access control model and its application is introduced. In this model,the user rights value will change with other users’ behavior,and users can use the authority file to prevent malicious sharing files and access permissions.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(09):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(09):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(09):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(09):47.

更新日期/Last Update: 2016-10-26