###
DOI:
Journal of Software:2007.18(4):955-966

新型网络环境下的访问控制技术
林闯,封富君,李俊山
(清华大学,计算机科学与技术系,北京,100084;清华大学,计算机科学与技术系,北京,100084;第二炮兵工程学院,计算机系,陕西,西安,710025)
Access Control in New Network Environment
LIN Chuang,FENG Fu-Jun,LI Jun-Shan
()
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 4157   Download 4812
Received:April 12, 2006    Revised:July 26, 2006
> 中文摘要: 访问控制是系统安全的关键技术,不同网络环境下的访问控制机制也是不同的.首先对3种传统的访问控制策略加以介绍,给出DAC(discretionary access control),MAC(mandatory access control)和RBAC(role-based access control)各自的特点及应用,并简要介绍下一代访问控制UCON(usage control)模型,然后分别针对网格、P2P、无线网络环境下的访问控制技术及目前的研究现状进行总结,详细阐述可信网络作为下一代互联网发展的必然
Abstract:Access control is an important technology for system security, and its mechanism is different for different networks. This paper first introduces the characteristics and applications of three traditional access control policies which are DAC (discretionary access control), MAC (mandatory access control) and RBAC (role-based access control), introduces the UCON (usage control) model, and then analyzes access control technology and current researches in Grid, P2P and wireless environment respectively. In addition, this paper proposes that trustworthy networks as the developing goal of the next generation Internet require using trust-based the access control model to assure security. This paper investigates on the trust and reputation model in detail, and finally gives the prospects of access control.
文章编号:     中图分类号:    文献标志码:
基金项目:Supported by the National Natural Science Foundation of China under Grant Nos.90412012,60273009(国家自然科学基金);the National Science Foundation for Distinguished Youth Scholar of China under Grant No.60429202(国家杰出青年科学基金) Supported by the National Natural Science Foundation of China under Grant Nos.90412012,60273009(国家自然科学基金);the National Science Foundation for Distinguished Youth Scholar of China under Grant No.60429202(国家杰出青年科学基金)
Foundation items:
Reference text:

林闯,封富君,李俊山.新型网络环境下的访问控制技术.软件学报,2007,18(4):955-966

LIN Chuang,FENG Fu-Jun,LI Jun-Shan.Access Control in New Network Environment.Journal of Software,2007,18(4):955-966