We characterized the security issues in asp - based networked manufacturing system , especially the issue of the user access control . then the typical methods of access control were introduced , which include discretionary access control ( dac ) , mandatory access control ( mac ) , role - based access control ( rbac ) , task - based access control ( tbac ) , coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on . based on that , we provided an integrated user access control model , which was composed of rbac , tbac , rdac and cbac 本章描述了asp和网络化制造系统的安全性问题,尤其是用户访问控制的问题;接着介绍了几种浙江大学博士学位论文典型的访问控制方法,包括强制访问控制、任意访问控制、基于角色的访问控制、基于任务的访问控制,以及基于公司关系的访问控制、基于企业联盟的访问控制等;在前面描述的典型访问控制模型基础上,给出了一个网络化制造系统的综合访问控制模型,包括网络化制造系统的用户和资源层次关系图、访问控制参考模型和访问控制过程模型,并定义了各个模型中的相关元素和关系,给出了各级约束验证和授权的表达;最后我们给出了以xacml为基础的网络化制造系统的访问控制描述语言。
Directing towards the security hidden trouble existing in intranet , the paper researches into relative technique and model of access control strategy , it brings forwards that role _ based access control can well guarantee the access security of network . in the combination of rbac96 , arbac97 and nrbac , aiming at the particularity of intranet , the paper constructs a role _ based access control model fitting for intranet . it designs three agents to achieve the model and draws a conclusion that the new model is secure 、 flexible and simple by applying the model to the real information system 针对内部网信息访问存在安全隐患问题,本文对安全访问控制策略的有关方法和模型进行了研究,提出基于角色的访问控制策略可以很好地保证网络的访问安全性;结合rbac96 、 arbac97模型以及nrbac模型,针对内部网存在的特殊要求,构造了一个适合内部网的基于角色的安全访问控制模型;设计了三种代理来实现模型,将模型应用到实际网络系统中加以验证,得出模型安全性高、灵活性好、简单易行的结论。
Third , based on the thorough research of the multilevel security models , integrity models and role - based access control models ( rbac ) , a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently . then , a well - integrated model of blp model , clark - wilson model , dte model and rbac models is proposed , leading to a prominent dynamic authorization access control model ( daacm ) , which supports diverse security policies , including confidentiality , integrity and authorization 第三,在深入研究多级安全模型、完整性模型、基于角色的授权模型等基础上,首先提出了一个修改blp模型( mblp )的方案,并在一个自主开发的安全操作系统中得到了应用;然后通过将blp模型、 clark - wilson模型、 dte模型、 rbac模型有机地集成应用,提升出一个支持机密性、完整性和授权等多安全策略的,可实现动态授权的访问控制模型( daacm ) 。
Then , based on the high security requirements of the integration system , this paper analyzes the insufficiencies of traditional access control model , constructs an access & control model for the integration system , and discusses several problems related to purview management , such as the hierarchical power authorization and repeal the authorization of originalpurview and the maintenance and management of purview information , etc . moreover , the paper carries out the researches on safe access control technologies of the integration ’ s information integrated system ; to solve the problems of insufficiencies in data backup and system recover in the whole system , and to solve the safe problems happens when storing and managing the backup data , an integrated framework of the integration system for data backup and recover is constructed , various integrated plans are discussed , furthermore , the paper fulfills the design and construction of the integrated framework for documents data backup and recover 其次,从大总体系统的高度安全性需求出发,分析了传统的访问控制模型的不足,建立了大总体系统的访问控制模型,并针对系统中的权限分级授权与撤销、初始权限的授予以及权限信息的维护管理等涉及系统中的权限管理方面的问题进行了研究讨论,实现了对大总体信息集成系统安全访问控制技术的研究;针对大总体系统内部的各数据备份与恢复系统的不足,为了避免备份数据存储管理的安全隐患,建立了大总体的数据备份与恢复集成框架,研究了各项集成方案,并实现了文档数据的备份与恢复集成框架的设计与建立。
Analyze the systematic structure of the product data management system and study the object representation of the product data integration model , the product data attribute and operation , the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method 分析产品数据管理系统的体系结构,研究产品数据的集成模型的对象表示,产品数据属性和操作,产品信息建模和访问控制建模的理论和方法;建立产品数据访问控制的对象模型,并说明对象模型的数据库转换和实现方法。