期刊文献+

PDM多粒度数据访问控制模型的研究 被引量:1

Research of Multi-granularity Data Access Control Model For PDM System
在线阅读 下载PDF
导出
摘要 为满足企业产品数据授权的多样化需求特点,在研究与分析现有几种访问控制模型的基础上,阐述了一个适用于PDM系统的多粒度数据控制模型,讨论数据访问控制主客体及其关联蔓延机制,提出复杂访问主体集、等价访问主客体等相关概念。说明了模型控制权限定义实现的数据存储结构设计,并就访问求解检测的算法给出了具体的实现步骤,最后介绍了该访问控制模型在实际系统中的成功应用。 In order to fred a solution on various authorization requirement of product data, a Multi-granularity control model for PDM system is put forward based on the analyze of several current access control model. Data access control object/subject and relation' s extension are discussed. On the other hand, concepts such as complex access subject aggregate and equivalent access object/subject are described. Design of the data storage structure with the definition of authorization is explained and detail steps about permission calculation are given to realize the model. Finally, successful application in practice of the access control model is introduced.
出处 《组合机床与自动化加工技术》 北大核心 2009年第8期49-53,共5页 Modular Machine Tool & Automatic Manufacturing Technique
基金 安徽省"十一五"科技攻关计划(07010202108)
关键词 访问控制 蔓延 等价访问 access control extension equivalent access
作者简介 柳吉庆(1982-),男,博士研究生,主要研究数字化设计与制造、产品数据管理,(E—mail)eyewar@163.com。
  • 相关文献

参考文献7

二级参考文献18

  • 1Sejong Oh, Seong Park. Task-role-based access control model[J]. Information Systems, 2003, 28(6): 533~562.
  • 2Pfleger C P. Security in Computing[M]. 2nd Ed. Englewood Cliffs, NJ: Prentice-Hall International Inc., 1997.
  • 3Russel D, Gangemi Sr G T. Computer Security Basics[M]. Sebastopol, California: O'Reilly & Associates, 1991.
  • 4James B D. Joshi, Walid G. Aref, Arif Ghafoor, et al. Security models for web-based applications[J]. Communications of the ACM, 2001, 44(2): 38~44.
  • 5Amoroso E G. Fundamental of Computer Security Technology[M]. Englewoods Cliffs, NJ: Prentice-Hall, 1994.
  • 6Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control method[J]. IEEE Computer, 1996, 29(2): 38~47.
  • 7Ferraio D, Cugini J, Kuhn R. Role-based access control(RBAC): features and motivations[A]. In: Proceedings of the 11th Annual Computer Security Application Conference, New Orleans, 1995. 12~20.
  • 8Gaby Herrmann, Guenther Pernul. Towards security semantics in workflow management[A]. In: Proceedings of the 31th Annual Hawaii International Conference on System Sciences, Hawaii, 1998, 7: 766~772.
  • 9SANDHU R S,COYNE E J,FEINSTEIN H L,et al. Rolebased access control models[J]. IEEE Computer,1996,29(2):38-47.
  • 10THOMAS R K. Team-based access control (TMAC) :a primitive for applying role-based access controls in collaborative environments[A]. Proceedings of the Second ACM Workshop on Role- based Access Control[C]. New York, NY, USA:ACM Press,1997.13-19.

共引文献26

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部