Computer Engineering and Applications ›› 2008, Vol. 44 ›› Issue (4): 179-181.

• 数据库与信息处理 • Previous Articles     Next Articles

Credible validation based DBMS access control model

MU Ya-li1,2,ZENG Hao3   

  1. 1.Navy University of Engineering,Wuhan 430033,China
    2.Informationization Office of Navy Logistics Department,Beijing 100841,China
    3.Navy Academy of Armament,Beijing 100073,China
  • Received:2007-05-28 Revised:2007-07-30 Online:2008-02-01 Published:2008-02-01
  • Contact: MU Ya-li

基于可信验证的DBMS访问控制模型

牟亚莉1,2,曾 浩3   

  1. 1.海军工程大学,武汉 430033
    2.海军后勤部 信息化办公室,北京 100841
    3.海军装备研究院,北京 100073
  • 通讯作者: 牟亚莉

Abstract: Actual access control model can’t realize the system’s security effectively.It presents an access control model for DBMS based on credible validation in trusted operation environment.The model can satisfy the system’s requirements of security and integrality,realize the bidirectional flow of information at most,and also support the least privilege security characteristic.It is a flexible access control model on privilege distributing.

Key words: DBMS, trusted operation environment, access control, trusted validation

摘要: 针对目前访问控制模型在系统的安全实现方面存在的不足,在RABC的基础上,提出了可信操作环境下基于可信验证的DBMS访问控制模型,该模型满足系统的保密性和完整性需求,最大程度实现信息双向流动,同时支持最小特权安全特性,是一个权限分配灵活的访问控制模型。

关键词: 安全数据库管理系统, 可信操作环境, 访问控制, 可信验证