天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于屬性RBAC的訪問(wèn)控制模型研究

發(fā)布時(shí)間:2018-04-13 22:41

  本文選題:訪問(wèn)控制 + RBAC; 參考:《山東師范大學(xué)》2014年碩士論文


【摘要】:近幾年,訪問(wèn)控制作為實(shí)現(xiàn)網(wǎng)絡(luò)安全的一種技術(shù)措施漸漸成為研究熱點(diǎn)。傳統(tǒng)的訪問(wèn)控制模型及其擴(kuò)展模型有很多,其中比較常見(jiàn)的有:自主訪問(wèn)控制模型(Discretionaryaccess control model)、基于角色的訪問(wèn)控制模型(Role based access control model)、強(qiáng)制訪問(wèn)控制模型(Mandatory access control model)、基于屬性的訪問(wèn)控制模型(Attributebased access control model)。在這之中使用控制模型(Usage control model)是較為完善的一種訪問(wèn)控制模型,不過(guò)它雖然改進(jìn)了傳統(tǒng)訪問(wèn)控制模型在授權(quán)和委托方面的缺陷,但在控制策略管理和細(xì)粒度劃分方面依然有不足之處。較為詳盡的剖析了訪問(wèn)控制的研究現(xiàn)狀以及其核心技術(shù)分析了開(kāi)放環(huán)境中解決安全威脅的迫切性、實(shí)現(xiàn)系統(tǒng)安全訪問(wèn)的必要性,陳述了訪問(wèn)控制模型的發(fā)展歷程、目前的研究現(xiàn)狀及核心技術(shù),對(duì)比剖析了各種模型的優(yōu)勢(shì)及缺陷,闡述了當(dāng)前開(kāi)放環(huán)境的特點(diǎn)等。本文圍繞UCON模型的優(yōu)缺點(diǎn),對(duì)控制模型進(jìn)行了探索和研究,主要的內(nèi)容以及創(chuàng)新點(diǎn)如下: 1.建立了一種基于屬性RBAC的訪問(wèn)控制模型。 針對(duì)傳統(tǒng)使用控制模型不能夠控制屬性、無(wú)法實(shí)現(xiàn)安全的委托授權(quán)而導(dǎo)致的訪問(wèn)控制不靈活問(wèn)題,提出一種新的基于屬性RBAC的訪問(wèn)控制模型。在理論層面分析各組成要素的邏輯關(guān)系,并提出了與其配套的使用控制策略模型。在此模型中,角色、屬性及使用控制決策因素義務(wù)、條件等相結(jié)合,,把屬性和角色的授權(quán)委托的模塊嵌入U(xiǎn)CON,實(shí)現(xiàn)了委托的功能,提高了靈活性和可靠性。 2.建立了一種具有時(shí)間約束的跨域控制模型 當(dāng)下網(wǎng)絡(luò)的發(fā)展趨勢(shì)為開(kāi)放、異構(gòu)的,系統(tǒng)間的跨域訪問(wèn)操作越發(fā)頻繁,跨域的訪問(wèn)控制研究很有必要。另一方面,在網(wǎng)絡(luò)系統(tǒng)中,依據(jù)時(shí)間段來(lái)控制訪問(wèn)亦越發(fā)的普遍。按照目前的網(wǎng)絡(luò)系統(tǒng)現(xiàn)狀,將時(shí)間約束和源域及目標(biāo)域概念引入使用控制模型,提高了模型的適應(yīng)性和實(shí)用性。 3.設(shè)計(jì)仿真實(shí)驗(yàn)驗(yàn)證模型的實(shí)用性 通過(guò)智能卡訪問(wèn)管理實(shí)例,驗(yàn)證本文提出的控制模型的實(shí)用性。在線閱讀實(shí)例中,通過(guò)一個(gè)用戶將部分在線書(shū)籍的閱讀權(quán)轉(zhuǎn)授予另一個(gè)用戶,驗(yàn)證本文提出的控制模型對(duì)授權(quán)委托的控制。
[Abstract]:In recent years, as a technical measure to realize network security, access control has gradually become a research hotspot.There are many traditional access control models and their extended models.Some of them are: discretionary access control model, role based access control model, mandatory access control model, Attribute-based access control model.Using the control model / usage control model is a more perfect access control model, but it improves the shortcomings of the traditional access control model in terms of authorization and delegation.However, there are still shortcomings in control strategy management and fine-grained partitioning.In this paper, the current research situation of access control and its core technology are analyzed in detail. The urgency of solving security threats in open environment and the necessity of system security access are analyzed. The development course of access control model is described.The present research status and core technology are analyzed, the advantages and disadvantages of various models are compared, and the characteristics of the current open environment are expounded.Based on the advantages and disadvantages of UCON model, this paper explores and studies the control model. The main contents and innovations are as follows:1.An access control model based on attribute RBAC is established.A new access control model based on attribute RBAC is proposed to solve the problem of inflexibility of access control caused by traditional usage control model which can not control attributes and can not implement secure delegation authorization.At the theoretical level, the logical relation of each component element is analyzed, and the corresponding usage control strategy model is proposed.In this model, roles, attributes and use control decision factors obligations and conditions are combined to embed the module of attribute and role delegation into UCON, which realizes the function of delegation and improves the flexibility and reliability.2.A cross-domain control model with time constraints is established.At present, the development trend of network is open, heterogeneous, inter-system cross-domain access operations more frequent, cross-domain access control research is necessary.On the other hand, in network system, it is more and more common to control access according to time period.According to the present situation of network system, the concepts of time constraint, source domain and target domain are introduced into the usage control model, which improves the adaptability and practicability of the model.3.Design simulation experiment to verify the practicability of the modelAn example of smart card access management is given to verify the practicability of the proposed control model.In an example of online reading, one user transfers the reading rights of some online books to another user, which verifies the control of authorization delegation by the control model proposed in this paper.
【學(xué)位授予單位】:山東師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 劉智敏;顧韻華;;基于角色的跨域使用控制模型及其應(yīng)用研究[J];信息技術(shù);2012年04期

2 陳穎;楊壽保;郭磊濤;申凱;;網(wǎng)格環(huán)境下的一種動(dòng)態(tài)跨域訪問(wèn)控制策略[J];計(jì)算機(jī)研究與發(fā)展;2006年11期

3 朱圣剛;劉欣;韓臻;;時(shí)態(tài)數(shù)據(jù)庫(kù)多級(jí)安全模型研究[J];計(jì)算機(jī)工程與應(yīng)用;2006年20期

4 道煒;湯庸;冀高峰;楊虹軼;;基于時(shí)限的角色訪問(wèn)控制委托模型[J];計(jì)算機(jī)科學(xué);2008年03期

5 顏學(xué)雄;王清賢;馬恒太;;Web服務(wù)訪問(wèn)控制模型研究[J];計(jì)算機(jī)科學(xué);2008年05期

6 鄧勇;張琳;王汝傳;張梅;;網(wǎng)格計(jì)算中基于信任度的動(dòng)態(tài)角色訪問(wèn)控制的研究[J];計(jì)算機(jī)科學(xué);2010年01期

7 袁磊;使用控制模型的研究[J];計(jì)算機(jī)工程;2005年12期

8 許峰 ,賴海光 ,黃皓 ,謝立;面向服務(wù)的角色訪問(wèn)控制技術(shù)研究[J];計(jì)算機(jī)學(xué)報(bào);2005年04期

9 初曉博;秦宇;;一種基于可信計(jì)算的分布式使用控制系統(tǒng)[J];計(jì)算機(jī)學(xué)報(bào);2010年01期

10 黃建,卿斯?jié)h,溫紅子;帶時(shí)間特性的角色訪問(wèn)控制[J];軟件學(xué)報(bào);2003年11期



本文編號(hào):1746559

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1746559.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶438e5***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com