全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

扩展角色的密文数据访问控制模型

DOI: 10.13190/jbupt.201105.19.pengwp, PP. 19-24

Keywords: 扩展角色,访问控制模型,授权管理,密文数据库

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种将分级密钥授权融入角色管理的密文数据访问控制(KRBAC)模型,并基于该模型提出了一种元素级的细粒度数据保护方案.KRBAC模型通过划分独立的密钥控制域,将传统的角色扩展为由角色、角色控制域和密钥控制域构成的具有偏序集继承关系和安全约束性质的三元组;在密钥分级的基础上,通过主密钥及数据的特征信息产生元素级的加解密密钥.分析结果表明,该模型能减少角色数量,降低访问控制的复杂度,提高权限分配的合理性,并能为细粒度的数据保护提供安全基础.

References

[1]  Sandhu R, Coyne E. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
[2]  Zhang Yue, Joshi J B D. A scoped administration model for RBAC with hybrid hierarchy [J]. Journal of Information Assurance and Security, 2008, 2: 128-139.
[3]  Crampton J, Loizou G. Administrative scope: a foundation for role-based administrative models [J]. ACM Transactions on Information and System Security, 2003, 6(2): 201-231.
[4]  Sejong Oh, Sandhu R. An effective role administration model using organization structure [J]. ACM Transactions on Information and System Security, 2006, 9(2): 113-137.
[5]  钟华, 冯玉琳, 姜洪安. 扩充角色层次关系模型及其应用[J]. 软件学报, 2000, 11(6): 779-784. Zhong Hua, Feng Yulin, Jiang Hongan. Role hierarchy model for role-based access control and its application [J]. Journal of Software, 2000, 11(6): 779-784.
[6]  An Y A, Hu X H, Song I Y. Maintaining mappings between conceptual models and relational schemas [J]. Journal of Database Management, 2010, 21(3): 36-68. (上接第18页)
[7]  Xu X, Sahni S. Approximation algorithms for sensor deployment[J]. IEEE Transactions on Mobile Computing, 2007, 56(12): 1681-1695.
[8]  Lin F Y S, Chiu P L. A near-optimal sensor placement algorithm to achieve complete coverage/discrimination in sensor networks[J]. IEEE Comm Letters, 2005, 9(1): 43-45.
[9]  刘巍, 崔莉. 基于蚁群算法的传感器网络节点部署设计[J]. 通信学报, 2009, 30(10): 24-33. Liu Wei, Cui Li. Ant based approach to the optimal deployment in wireless sensor networks[J]. Journal of Communication, 2009, 30(10): 24-33.
[10]  Jourdan B, Weck O L. Layout optimization for a wireless sensor network using a multi-objective genetic algorithm//Proceeding of IEEE Vehicular Technology Conference. Los Angeles: IEEE Press, 2004: 2466-2470.
[11]  何欣, 桂小林, 安健. 面向目标覆盖的无线传感器网络确定性部署方法[J]. 西安交通大学学报, 2010, 44(6): 6-10. He Xin, Gui Xiaolin, An Jian. A deterministic deployment approach of nodes in wireless sensor networks for target coverage[J]. Journal of Xian Jiaotong University, 2010, 44(6): 6-10.
[12]  Xu Y, Yao X. A GA approach to the optimal placement of sensors in wireless sensor networks with obstacles and preferences//Proceedings of IEEE Conference on Consumer Communications and Networking (CCNC). Las Vegas: IEEE Press, 2006: 127-131.
[13]  Hochbaum D S. Approximation algorithms for the set covering and vertex cover problems[J]. SIAM Journal on Computing, 1982, 11(3): 555-556.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133