首页 | 本学科首页   官方微博 | 高级检索  
     

使用控制访问模型的研究
引用本文:彭凌西,杨频,彭银桥,孙飞显,曾金全,刘才铭. 使用控制访问模型的研究[J]. 计算机应用研究, 2007, 24(9): 121-123
作者姓名:彭凌西  杨频  彭银桥  孙飞显  曾金全  刘才铭
作者单位:广东海洋大学,信息学院,广东,湛江,524025;四川大学,计算机学院,成都,610065;四川大学,计算机学院,成都,610065;广东海洋大学,信息学院,广东,湛江,524025
基金项目:国家自然科学基金 , 广东海洋大学校科研和教改项目
摘    要:分析了现今高度动态和分布式环境下,传统的访问控制模型已不能满足信息访问的需要,并由此引出了下一代访问控制模型--使用控制模型(usage control,UCON).将UCON与传统访问控制模型进行了比较,分析了UCON的定义及组成成分,给出了UCON的16种基本核心模型形式化描述及应用实例,分析了UCON的具体实现框架,最后指出了目前研究的难点和需要解决的关键问题.

关 键 词:访问控制模型  使用控制  网络安全
文章编号:1001-3695(2007)09-0121-03
修稿时间:2006-07-302006-09-25

Survey of usage access control model
PENG Ling xi,YANG Pin,PENG Yin qiao,SUN Fei xian,ZENG Jin quan,LIU Cai ming. Survey of usage access control model[J]. Application Research of Computers, 2007, 24(9): 121-123
Authors:PENG Ling xi  YANG Pin  PENG Yin qiao  SUN Fei xian  ZENG Jin quan  LIU Cai ming
Affiliation:l. School of Information, Guangdong Ocean University, Zhanfiang Guangdang 524025, China; 2. School of Computer, Sichuan University, Chengdu 610065, China
Abstract:In today's highly dynamic and distributed environment,the traditional access control models can not meet the need of the information access.The next generation access control model usage control(UCON)model,was presented.The UCON model was first compared with the traditional access control models,and then the components and definition of the model were discussed.The 16 types of basic core models of UCON was formalized and the application instances were given.The imple- mentation frame of UCON was also presented.Finally,the difficulties of research and the existing problems that must be solved were pointed out.
Keywords:access control model   usage control   network security
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号