期刊文献+

一种基于角色访问控制的数据库安全模型 被引量:4

A Database Safe Model Based on Role Access Control
在线阅读 下载PDF
导出
摘要 基于角色的访问控制是目前国际上先进的安全管理控制方法。文中利用基于角色的访问控制技术为数据库建立了一个多层次的安全防御模型。使用Windows的访问控制表(ACL)所提供的安全机制和数据库的触发器控制技术,分别在数据库的外部和内部构筑了两道防线,把数据库的安全性提升到一个较为理想的状态。 Role-based access control is at present an advanced safe control way in the world. Develop a safe defense model with multiple levels using the technology of role - based access control. To enhance the security of database to an ideal degree, also construct two defense lines both outside and inside the database with the safe mechanisan provided by the ACL in Windows and the trigger in the database.
出处 《微机发展》 2005年第10期8-10,共3页 Microcomputer Development
基金 广西科技攻关项目(桂科攻033008-9)
关键词 角色 访问控制 RBAC ACL 触发器 access control RBAC ACL trigger
作者简介 宁葵(1970-),男,广西浦北人工程师,硕士研究生,研究方向为网络安全、分布式计算、软件工程。
  • 相关文献

参考文献5

二级参考文献11

  • 1[1]Hwang Jingjang, Wu Kouchen, Liu Duenren. Access Control with Role Attribute Certificates[J]. Computer Standards & Interfaces,2000, 22: 43-53
  • 2[2]Johnston W, Mudumbai S, Thompson M. Authorization and Attribute Certificates for Widely Distributed Access Control[J]. Information and Computing Sciences Division, Lawrence Berkeley National Laboratory Berkeley, CA, 94720, 1998
  • 3[3]Wohlmacher P, Pharow P. Application in Health Care Using Public Key Certifications and Attribute Certificates[J]. IEEE Journal,2000: 1063-9527
  • 4[4]Lin A, Brown R. The Application of Security Policy to Role-based Access Control and the Common Data Security Architecture[J]. Computer Communications,2000,23: 1584-1593
  • 5[5]Doshi V, Fayad A, Jajodia S, et al. Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications[J].IEEE Journal, 2000:1063-9527
  • 6[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 7[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 8[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 9[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 10[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24

共引文献43

同被引文献28

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部