...
【24h】

An Overview on Access Control Models

机译:访问控制模型概述

获取原文
获取原文并翻译 | 示例
           

摘要

Research in the field of information security systems and access control were initiated in the early seventies by United States Department of Defense, following the emergence of new technical, scientific and social challenges. Since, many models of security have been set up to answer to some specific needs with more or less accuracy in term of security. This manuscript gives a survey on the current security models with a specific classification in term of their use: Access Control, Flow Control and Administration. This manuscript is the subject of an assessment of advantages and drawbacks of access control models cited in literature and also the efficiency of their security policies. Finally, a presentation of the contributions of Flow Control and Administration models that allow the reinforcement of the security.
机译:随着新的技术,科学和社会挑战的出现,美国国防部于70年代初开始了对信息安全系统和访问控制领域的研究。从那时起,已经建立了许多安全模型,可以在安全方面或多或少地满足某些特定需求。该手稿对当前的安全模型进行了调查,并按用途进行了特定分类:访问控制,流控制和管理。该手稿是评估文献中引用的访问控制模型的优缺点以及其安全策略的效率的主题。最后,介绍了可以加强安全性的流控制和管理模型的贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号