期刊文献+

企业信息门户访问控制安全模型的设计 被引量:1

Model design of access control safety of enterprise information gateway
在线阅读 下载PDF
导出
摘要 在互联网经济时代,网络成为企业实施业务流程的重要工具。企业信息门户提供了企业统一网络解决方案。介绍了一种企业信息门户访问控制的安全模型,考虑到应用环境的动态特性和多管理域的特性,采用基于智体(Agent)技术的访问控制技术,并兼顾域内访问控制和域间访问控制两方面,提出一种通用的访问控制安全模型。 In the age of Internet economy, network has become an important means in implying enterprise business process. Enterprise information gateway offers an unified solving plan of enterprise network. A safety model of enterprise information gateway for access was introduced. Regarding of the dynamical quality and complicated management domain condition of the application environment, a visiting and controlling technology based on the intelligent Agent was adopted. Moreover, the visiting and controlling both intra-domain and domains was taken into account. At last, a general safety model for visiting and controlling was proposed.
出处 《鞍山科技大学学报》 CAS 2007年第2期155-159,共5页 Journal of Anshan University of Science and Technology
关键词 企业信息门户 访问控制安全 智体 enterprise information gateway access control safety agent
作者简介 白秋颖(1970-),女,辽宁阜新人,副教授。
  • 相关文献

参考文献7

二级参考文献21

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 3[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 4[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 5[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 6[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24
  • 7陆汝钤.世纪之交的知识工程与知识科学[M].北京:清华大学出版社,2001..
  • 8ITU-T Recommendation X.812. Security Frameworks for open Systems: Access Control Framework.
  • 9Sandhu R, Coyne E J. Role-based Access Control Models.IEEE Computer, 1996 (2).
  • 10Sandhu R. Role-based Access Control laboratory for Information Security Technology. ISSE Department, MS4A4,George Mason University, 1997.

共引文献101

同被引文献4

  • 1Sandhu R,Coyne E J,Role-based Access Control Models.IEEE Computer, 1996(2).
  • 2信息安全概论.段云所副教授北京大学信息学院.
  • 3Kapadia A,Al-Muhtadi J,Campbell R,et al,IRBAC2000:Secure Interperability Using Dynamic Role Translation.In:The 1st International Conference on internet Computing,june 26th-29th, 2000,USA,2000.
  • 4曹晓叶,王知衍,许晓伟,梁英宏.基于SOA的企业应用集成研究与应用[J].微计算机信息,2007,23(36):16-18. 被引量:26

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部