Research on security policies integration model

被引:0
作者
Liu Xin [1 ]
Li Hongwei [1 ]
Han Zhen [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp Sci & Technol, Beijing 100044, Peoples R China
来源
2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4 | 2006年
关键词
information security; access control; DAC; MAC; RBAC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the popularity and development of distributed systems, the problem of integration of multiple access control mechanisms of information systems emerged inevitably. Theories on graph and state machine are used to research the mapping from local security mechanism to the global access control mechanism.,An integration model: Authorization Propagation Tree (APT) model which support DAC, MAC and RBAC is proposed to solve it in the paper The paper also gives the formal definition and security proving of the security model based on APT.
引用
收藏
页码:2579 / +
页数:2
相关论文
共 5 条
[1]  
[Anonymous], 2006, IEEE COMPUTER
[2]  
BELL DE, 1974, ESDTR73278 AIR FORC, V3
[3]  
BERTINO E, 1996, IEEE S SEC PRIV OAKL
[4]  
JIANG ZL, 2000, FORMAL LANGUAGE AUTO
[5]  
LIUYI, 2000, DATABASE INFORM SYST