访问控制模型研究进展及发展趋势

李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …

Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

Understanding and improving computational science storage access through continuous characterization

P Carns, K Harms, W Allcock, C Bacon, S Lang… - ACM Transactions on …, 2011 - dl.acm.org
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …

Security analysis in role-based access control

N Li, MV Tripunitara - ACM Transactions on Information and System …, 2006 - dl.acm.org
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …

A policy language for distributed usage control

M Hilty, A Pretschner, D Basin, C Schaefer… - … Security–ESORICS 2007 …, 2007 - Springer
Abstract We present the Obligation Specification Language (OSL), a policy language for
distributed usage control. OSL supports the formalization of a wide range of usage control …

Peer-to-peer access control architecture using trusted computing technology

R Sandhu, X Zhang - Proceedings of the tenth ACM symposium on …, 2005 - dl.acm.org
It has been recognized for some time that software alone does not provide an adequate
foundation for building a high-assurance trusted platform. The emergence of industry …

On obligations

M Hilty, D Basin, A Pretschner - … on Research in Computer Security, Milan …, 2005 - Springer
Access control is concerned with granting access to sensitive data based on conditions that
relate to the past or present, so-called provisions. Expressing requirements from the domain …

Towards a VMM-based usage control framework for OS kernel integrity protection

M Xu, X Jiang, R Sandhu, X Zhang - … of the 12th ACM symposium on …, 2007 - dl.acm.org
Protecting kernel integrity is one of the fundamental security objectives in building a
trustworthy operating system (OS). For this end, a variety of approaches and systems have …

Protection of data in a mixed use device

E Reus, S Field, MJ Healy, J Dadzie… - US Patent …, 2014 - Google Patents
Data management techniques are provided for handling information resources. A data
management process can account for attributes of information resources by analyzing or …

An attribute-based access matrix model

X Zhang, Y Li, D Nalla - Proceedings of the 2005 ACM symposium on …, 2005 - dl.acm.org
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are
determined according to identities of subjects and objects, which are authenticated by a …