首页 | 本学科首页   官方微博 | 高级检索  
     

基于有向图模型的委托研究
引用本文:张秀娟,夏建川.基于有向图模型的委托研究[J].计算机安全,2010(2):18-19,22.
作者姓名:张秀娟  夏建川
作者单位:曲阜师范大学,计算机科学学院,山东,日照,276826
摘    要:委托是常见的一种安全策略形式,委托可以用带标识的有向图对其严格地形式化建模,称为委托图。给出了委托图的定义,存储,委托图中实现委托的算法,委托图无环性判定算法,并进行了分析,讨论了委托图的性质。

关 键 词:信息安全  访问控制  委托  有向无环图  算法

Delegation Research Based on Directed Graph
ZHANG Xiu-juan,XIA Jian-chuan.Delegation Research Based on Directed Graph[J].Network & Computer Security,2010(2):18-19,22.
Authors:ZHANG Xiu-juan  XIA Jian-chuan
Affiliation:College of Computer Sci. and Tech.;Qufu Normal University;Rizhao;Shandong 276826;China
Abstract:Delegation is a common form of a security policy. Delegation can be identified by a directed graph with its rigorous formal modeling, called the delegation graph. In this paper, the definition and the store of delegation graph are given, algorithm of how to implement delegation in the delegation graph and how to judge a directed acyclic graph is discussed.
Keywords:information security  access control  delegation  directed acyclic graph  algorithm  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号