p.4565
p.4571
p.4578
p.4584
p.4590
p.4597
p.4603
p.4610
p.4615
Usage Control Model Based on Regular Grammar
Abstract:
Traditional access control models through search Access Control List(ACL) to authorize [1-3]. Traditional access control models fail to satisfy the modern information system, thus Usage Control( UCON ) models were produced and fundamentally enhanced the traditional access control. The UCON models are considered as the next generation access control models. This paper is organized as follow. Section 1 introduces the Usage Control models. Section 2 introduces Regular Grammar ( RG ). Section 3 gives the RG of the 16 core ABC UCON models. Section 4 gives the RG of on-line antivirus procedure. Finally, section 5 summarizes this paper.
Info:
Periodical:
Pages:
4590-4596
Citation:
Online since:
January 2012
Authors:
Keywords:
Price:
Сopyright:
© 2012 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: