首页 | 本学科首页   官方微博 | 高级检索  
     

基于网络环境安全的可信访问控制策略
引用本文:陈虹志,周安民,邓 赟.基于网络环境安全的可信访问控制策略[J].太赫兹科学与电子信息学报,2010,8(4):463-466.
作者姓名:陈虹志  周安民  邓 赟
作者单位:1. 四川大学,信息安全研究所,四川,成都,610064
2. 中国电子科技集团公司,第30研究所,四川,成都,610041
摘    要:为了抵御网络系统受到非法访问,文章在基于RBAC访问控制模型的基础上,结合可信计算的思想和原则,提出了一种基于环境的ERBAC访问控制模型。该模型将角色与网络系统环境的安全性相关联,只有当用户的环境条件达到一定的安全阈值时,其对应角色的权限方案才会生效,并能访问相应资源。最后结合实例证明了该模型及其语义实施的正确性。

关 键 词:基于角色的访问控制  ERBAC访问控制模型  可信度量  网络安全
收稿时间:2009/12/9 0:00:00
修稿时间:2010/1/13 0:00:00

One trusted computing access control strategy based on network environment security
CHEN Hong-zhi,ZHOU An-min and DENG Yun.One trusted computing access control strategy based on network environment security[J].Journal of Terahertz Science and Electronic Information Technology,2010,8(4):463-466.
Authors:CHEN Hong-zhi  ZHOU An-min and DENG Yun
Affiliation:1.Institute of Information Security,Sichuan University,Chengdu Sichuan 610064,China;2.The 30th Institute of China Electronics Technology Group Corporation,Chengdu Sichuan 610041,China)
Abstract:To defend network system against the harm done by unauthorized access.basing on theory and conception of trusted computing and Role Based Access Control(RBAC) model,this paper proposes an access control model named Environment Role Based Access Control(ERBAC).This model correlates the role with system environment security.When an user′s environment is secure enough,the permissions corresponding to its roles are valid,and the user is allowed to access resources.An access control application instance is given to prove the effectiveness of the model and semantics.
Keywords:Role Based Access Control  ERBAC model  trust measurement  network security
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《太赫兹科学与电子信息学报》浏览原始摘要信息
点击此处可从《太赫兹科学与电子信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号