Research of Security Mechanism Based on Policy of Hybrid Access Control

Article Preview

Abstract:

Access control plays an important role in computer security, which has ensured the legitimate access of users and has effectively prevented illegal intrusion of user resources. The model of hybrid access control TRBAC and HARBAC are took as a starting point, and the paper has analyzed the access control policy and the security mechanism of access control, has studied the important role of information security entropy played in the access control policy, and has solved the security problem of access control.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5676-5679

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Fenghua Li, mang Su. The research progress and development trend of access control model [J]. Acta electronica Sinica, 2012, 40(4): 805-809.

Google Scholar

[2] Yinzhang Guo, Jianchao Zeng. The collaborative design process of dynamic access control based on TRBAC hybrid model [J]. Computer integrated manufacturing system, 2012, 18(2): 261-268.

Google Scholar

[3] Yiming Bian. Research on access control model based on hybrid attribute [D]. Jiangsu, Nanjing University of Posts and Telecommunications, 2012: 1-10.

Google Scholar

[4] Fenghua Li, mang Su. Description and application of access control policy [J]. Computer engineering and application, 2011(26): 136-140.

Google Scholar

[5] Wenchong Xie. Access control framework and its related technology based on the risk [D]. Henan, PLA Information Engineering University, 2013: 3-12.

Google Scholar

[6] Chao Wang, Xingyuan Chen. Study on safety analysis of access control policy based on the weighted entropy [J]. Acta electronica Sinica, 2013, 41(1): 47-51.

Google Scholar

[7] Chao Wang, Xingyuan Chen, Houren Xiong etc. Method of quantitative analysis of access control model based the entropy of safety [J]. Computer engineering and design, 2012, 33(8): 2911-292.

Google Scholar