首页 | 本学科首页   官方微博 | 高级检索  
     

新型网络环境下的访问控制技术
引用本文:林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966.
作者姓名:林闯  封富君  李俊山
作者单位:1. 清华大学,计算机科学与技术系,北京,100084
2. 清华大学,计算机科学与技术系,北京,100084;第二炮兵工程学院,计算机系,陕西,西安,710025
3. 第二炮兵工程学院,计算机系,陕西,西安,710025
基金项目:国家自然科学基金;国家自然科学基金
摘    要:访问控制是系统安全的关键技术,不同网络环境下的访问控制机制也是不同的.首先对3种传统的访问控制策略加以介绍,给出DAC(discretionary access control),MAC(mandatory access control)和RBAC(role-based access control)各自的特点及应用,并简要介绍下一代访问控制UCON(usage control)模型,然后分别针对网格、P2P、无线网络环境下的访问控制技术及目前的研究现状进行总结,详细阐述可信网络作为下一代互联网发展的必然

关 键 词:自主访问控制  强制访问控制  基于角色的访问控制  可信模型
收稿时间:2006-04-12
修稿时间:2006-07-26

Access Control in New Network Environment
LIN Chuang,FENG Fu-Jun and LI Jun-Shan.Access Control in New Network Environment[J].Journal of Software,2007,18(4):955-966.
Authors:LIN Chuang  FENG Fu-Jun and LI Jun-Shan
Abstract:Access control is an important technology for system security, and its mechanism is different for different networks. This paper first introduces the characteristics and applications of three traditional access control policies which are DAC (discretionary access control), MAC (mandatory access control) and RBAC (role-based access control), introduces the UCON (usage control) model, and then analyzes access control technology and current researches in Grid, P2P and wireless environment respectively. In addition, this paper proposes that trustworthy networks as the developing goal of the next generation Internet require using trust-based the access control model to assure security. This paper investigates on the trust and reputation model in detail, and finally gives the prospects of access control.
Keywords:DAC (discretionary access control)  MAC (mandatory access control)  RBAC (role-based access control)  trust model
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号