节点文献

新型网络环境下的访问控制技术

Access Control in New Network Environment

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 封富君李俊山

【Author】 LIN Chuang1+, FENG Fu-Jun1,2, LI Jun-Shan2 1(Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China) 2(Department of Computer Science, The Second Artillery Engineering College, Xi’an 710025, China)

【机构】 清华大学计算机科学与技术系清华大学计算机科学与技术系 北京100084北京100084 第二炮兵工程学院计算机系陕西西安710025北京100084

【摘要】 访问控制是系统安全的关键技术,不同网络环境下的访问控制机制也是不同的.首先对3种传统的访问控制策略加以介绍,给出DAC(discretionary access control),MAC(mandatory access control)和RBAC(role-based access control)各自的特点及应用,并简要介绍下一代访问控制UCON(usage control)模型,然后分别针对网格、P2P、无线网络环境下的访问控制技术及目前的研究现状进行总结,详细阐述可信网络作为下一代互联网发展的必然目标,要求基于可信的访问控制模型保证其安全性,对可信和信誉模型进行了研究,最后给出访问控制技术的发展趋势.

【Abstract】 Access control is an important technology for system security, and its mechanism is different for different networks. This paper first introduces the characteristics and applications of three traditional access control policies which are DAC (discretionary access control), MAC (mandatory access control) and RBAC (role-based access control), introduces the UCON (usage control) model, and then analyzes access control technology and current researches in Grid, P2P and wireless environment respectively. In addition, this paper proposes that trustworthy networks as the developing goal of the next generation Internet require using trust-based the access control model to assure security. This paper investigates on the trust and reputation model in detail, and finally gives the prospects of access control.

【基金】 SupportedbytheNationalNaturalScienceFoundationofChinaunderGrantNos.90412012,60273009(国家自然科学基金);theNationalScienceFoundationforDistinguishedYouthScholarofChinaunderGrantNo.60429202(国家杰出青年科学基金)
  • 【文献出处】 软件学报 ,Journal of Software , 编辑部邮箱 ,2007年04期
  • 【分类号】TP393.08
  • 【被引频次】231
  • 【下载频次】2282
节点文献中: 

本文链接的文献网络图示:

本文的引文网络