One trusted computing access control strategy based on network environment security
DOI:
Author:
Affiliation:

Funding:

Ethical statement:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    To defend network system against the harm done by unauthorized access. basing on theory and conception of trusted computing and Role Based Access Control(RBAC) model,this paper proposes an access control model named Environment Role Based Access Control(ERBAC). This model correlates the role with system environment security. When an user′s environment is secure enough, the permissions corresponding to its roles are valid,and the user is allowed to access resources. An access control application instance is given to prove the effectiveness of the model and semantics.

    Reference
    Related
    Cited by
Get Citation

陈虹志,周安民,邓 赟.基于网络环境安全的可信访问控制策略[J]. Journal of Terahertz Science and Electronic Information Technology ,2010,8(4):463~466

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
History
  • Received:December 09,2009
  • Revised:January 13,2010
  • Adopted:
  • Online:
  • Published: