• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
HAN Pei-sheng, ZHAO Yong, LI Yu. Process-Consistent Access Control System[J]. Journal of Beijing University of Technology, 2010, 36(5): 698-702.
Citation: HAN Pei-sheng, ZHAO Yong, LI Yu. Process-Consistent Access Control System[J]. Journal of Beijing University of Technology, 2010, 36(5): 698-702.

Process-Consistent Access Control System

More Information
  • Received Date: December 09, 2009
  • Available Online: December 14, 2022
  • At present, many access control systems consist of a variety of access control mechanisms with no relation to each other, which cause the problem of inconsistency. To solve the problem, the paper presented the concept of full-process-consistent access control. Then, the structure, division and guidelines were introduced to guide the construction of full-process-consistent access control system. Finally, the system was verified using a prototype system. With this system, the advantages of various access control mechanisms could be effectively brought into play and the cost could be reduced.
  • Related Articles

    [1]YANG Ruizhe, HE Ruilan, SUN Enchang, ZHANG Hui, ZHANG Yanhua. Air Access Network in 6G Technology: Progress and Prospect[J]. Journal of Beijing University of Technology, 2022, 48(11): 1175-1188. DOI: 10.11936/bjutxb2021050008
    [2]DUAN Jianmin, YANG Chen, SHI Hui. Path Tracking Based on Pure Pursuit Algorithm for Intelligent Vehicles[J]. Journal of Beijing University of Technology, 2016, 42(9): 1301-1306. DOI: 10.11936/bjutxb2015060065
    [3]YE Shaozhen, CHEN Liqing. Searchable Attribute-based Encryption Access Control Scheme[J]. Journal of Beijing University of Technology, 2016, 42(8): 1160-1166. DOI: 10.11936/bjutxb2015080017
    [4]ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, LIU Gong-zheng, LIU Ruo-hong. Scheme for Dynamic Access Control Based on Trust[J]. Journal of Beijing University of Technology, 2014, 40(9): 1422-1427.
    [5]ZHAO Yong, LIAO Jian-hua, SHEN Chang-xiang. Industry Control System Security Assurance Method Based on Access Verification[J]. Journal of Beijing University of Technology, 2013, 39(12): 1861-1867.
    [6]XU Fei, HE Jing-sha, XU Jing, ZHANG Yu-qiang. Access Control Model for Privacy Protection[J]. Journal of Beijing University of Technology, 2012, 38(3): 406-409.
    [7]PAN Li-li, ZOU Bei-ji, WANG Tian-e, CHEN Hao. Analysis of the Infeasible Path Based on Key Branch[J]. Journal of Beijing University of Technology, 2010, 36(5): 716-720.
    [8]FAN Yan-fang, HAN Zhen, ZHAO Yong, GENG Xiu-hua. The Mandatory Access Control Model for Document Flow[J]. Journal of Beijing University of Technology, 2010, 36(5): 694-697.
    [9]REN Xing-tian, HUANG Xiao-hong, SU Yu-jie, MA Yan. XML-based Access Control Model for Service Management Information[J]. Journal of Beijing University of Technology, 2009, 35(10): 1412-1418.
    [10]Zhu Wenchao, Liu Hinzhen, Chen Jianzhong. Development of a Special-purpose Database Management System Based on Microsoft Access Client/Server Mode[J]. Journal of Beijing University of Technology, 1999, 25(2): 114-118,128.

Catalog

    Article views (15) PDF downloads (8) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return