Thirdly , this paper presents a new model called multi - database , workflow and role - based access control ( mdwrbac ) , on the basis of full analyzing role - based access control models . the characters of mdwrbac model are as follows 对安全访问控制模型进行研究,提出了一种适应公文流转系统的基于多数据库、工作流与角色的访问控制( mdwrbac )模型。
Research on gfac and flask , presents an access control model frame suitable for ertos , this frame has open architecture and is easy to extend . 5 . deeply studies windows ce codes , realizes mpacm in windows ce to enhance its security 该模型充分考虑了嵌入式系统应用的多样性,综合了几种访问控制模型的优点,能对主客体的安全标记进行有效管理,重点加强主体对客体的强制访问控制。
With the in - depth analysis of the concept and theory about safely access control and rbac model , this paper puts forward a rough architecture of a safely access control model based rbac , the essential meaning and function of its component are discussed too 通过对安全访问控制技术及rbac模型深入分析,本文提出了在intranet internet环境下基于rbac模型的安全访问控制系统的总体结构,并具体分析系统的各个组成部分功能及其相互关系。
We introduce the design and implementation of the multiple policies access control model of ercist 4 . 0 secure operating system in this thesis . we can choose to use only one access control mechanism or several access control mechanisms at the same time in the secure operating system 本文对安胜4 . 0安全操作系统的多策略的访问控制模型的设计和实现进行了介绍,系统中可以单独采取某一种访问控制机制,也可以同时采取多种访问控制机制。
Secondly , it focuses on the technology of b / s mode developed on lotus domino / notes platfom . afterwards it presents a role - based access control model to sovel the problem of an normal document visited and operated safely by a different figure belong to a different department . and it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine 接着重点研究了在lotusdomino / notes平台上实现web访问方式的技术特点,同时引入了基于角色的安全访问控制模型,解决了不同部门、不同身份的用户访问不同的文档信息和对文档的安全操作,使办公文档得以安全控制;在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
We characterized the security issues in asp - based networked manufacturing system , especially the issue of the user access control . then the typical methods of access control were introduced , which include discretionary access control ( dac ) , mandatory access control ( mac ) , role - based access control ( rbac ) , task - based access control ( tbac ) , coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on . based on that , we provided an integrated user access control model , which was composed of rbac , tbac , rdac and cbac 本章描述了asp和网络化制造系统的安全性问题,尤其是用户访问控制的问题;接着介绍了几种浙江大学博士学位论文典型的访问控制方法,包括强制访问控制、任意访问控制、基于角色的访问控制、基于任务的访问控制,以及基于公司关系的访问控制、基于企业联盟的访问控制等;在前面描述的典型访问控制模型基础上,给出了一个网络化制造系统的综合访问控制模型,包括网络化制造系统的用户和资源层次关系图、访问控制参考模型和访问控制过程模型,并定义了各个模型中的相关元素和关系,给出了各级约束验证和授权的表达;最后我们给出了以xacml为基础的网络化制造系统的访问控制描述语言。
Directing towards the security hidden trouble existing in intranet , the paper researches into relative technique and model of access control strategy , it brings forwards that role _ based access control can well guarantee the access security of network . in the combination of rbac96 , arbac97 and nrbac , aiming at the particularity of intranet , the paper constructs a role _ based access control model fitting for intranet . it designs three agents to achieve the model and draws a conclusion that the new model is secure 、 flexible and simple by applying the model to the real information system 针对内部网信息访问存在安全隐患问题,本文对安全访问控制策略的有关方法和模型进行了研究,提出基于角色的访问控制策略可以很好地保证网络的访问安全性;结合rbac96 、 arbac97模型以及nrbac模型,针对内部网存在的特殊要求,构造了一个适合内部网的基于角色的安全访问控制模型;设计了三种代理来实现模型,将模型应用到实际网络系统中加以验证,得出模型安全性高、灵活性好、简单易行的结论。
Third , based on the thorough research of the multilevel security models , integrity models and role - based access control models ( rbac ) , a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently . then , a well - integrated model of blp model , clark - wilson model , dte model and rbac models is proposed , leading to a prominent dynamic authorization access control model ( daacm ) , which supports diverse security policies , including confidentiality , integrity and authorization 第三,在深入研究多级安全模型、完整性模型、基于角色的授权模型等基础上,首先提出了一个修改blp模型( mblp )的方案,并在一个自主开发的安全操作系统中得到了应用;然后通过将blp模型、 clark - wilson模型、 dte模型、 rbac模型有机地集成应用,提升出一个支持机密性、完整性和授权等多安全策略的,可实现动态授权的访问控制模型( daacm ) 。
Then , based on the high security requirements of the integration system , this paper analyzes the insufficiencies of traditional access control model , constructs an access & control model for the integration system , and discusses several problems related to purview management , such as the hierarchical power authorization and repeal the authorization of originalpurview and the maintenance and management of purview information , etc . moreover , the paper carries out the researches on safe access control technologies of the integration ’ s information integrated system ; to solve the problems of insufficiencies in data backup and system recover in the whole system , and to solve the safe problems happens when storing and managing the backup data , an integrated framework of the integration system for data backup and recover is constructed , various integrated plans are discussed , furthermore , the paper fulfills the design and construction of the integrated framework for documents data backup and recover 其次,从大总体系统的高度安全性需求出发,分析了传统的访问控制模型的不足,建立了大总体系统的访问控制模型,并针对系统中的权限分级授权与撤销、初始权限的授予以及权限信息的维护管理等涉及系统中的权限管理方面的问题进行了研究讨论,实现了对大总体信息集成系统安全访问控制技术的研究;针对大总体系统内部的各数据备份与恢复系统的不足,为了避免备份数据存储管理的安全隐患,建立了大总体的数据备份与恢复集成框架,研究了各项集成方案,并实现了文档数据的备份与恢复集成框架的设计与建立。
Analyze the systematic structure of the product data management system and study the object representation of the product data integration model , the product data attribute and operation , the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method 分析产品数据管理系统的体系结构,研究产品数据的集成模型的对象表示,产品数据属性和操作,产品信息建模和访问控制建模的理论和方法;建立产品数据访问控制的对象模型,并说明对象模型的数据库转换和实现方法。