基于可信计算的层次共享组访问控制模型的分析-analysis of hierarchical shared group access control model based on trusted computing.docxVIP
- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基于可信计算的层次共享组访问控制模型的分析-analysis of hierarchical shared group access control model based on trusted computing
LevelofSharedGroupAccessControlModelBasedonTrustedComputingAbstractWiththeunceasingdevelopmentofinternettechnologyandhighnetworkresourcesharing,thereareissuesofidentityauthenticationofbothpartiestotheinterconnection,aswellassecureaccesscontrol(AC)ofconfidentialityandintegrityofinformation.Obviously,traditionalidentityauthenticationpolicy,accesscontrolpolicyandthelikearenomoreappropriate,sotheaccesscontrolmodelbasedontrustedcomputing(TC)ispresentedinthispaperinordertotackletheproblemsabove.Thispaperthoroughlylucubratesinrelativetechnologiesoftrustedcomputing,accesscontrolandmulti-hierarchyaccesscontrol(MHAC).Inallusiontosomedeficienciesexistedinthesemodelsinopennetworkcurrently,itproposeslevelofsharedgroupaccesscontrolmodelbasedontrustedcomputing,throughthecombinationoftrustedcomputingtechnologyandtheintroductionoftheconceptof‘trust’.Usingtrustedcomputinginfrastructure(TCI)constructedbytrustedcomputingtechnologyasthebasesupport,intheprocessofauthorizedaccess,thismodeltransfersthetrustfromTCItotrustrelationship,thenTCIwillusedirectanonymousattestation(DAA)providedbytrustedplatformmodule(TPM)toachievetrustedidentityauthenticationbasedonthehardware.BuildinguponMHAC,themodelputsforwardanewlevelofsharedgroupaccesscontrolmodel,andsettlemattersofconfidentiality,integrityandavailabilityofsharedinformationviatheintroductionoftheconceptof‘level’.Additionally,itdepictsanddefinestheaccesscontrolpolicyinitsentirety.Bymeansofusecasediagramandclassdiagraminunifiedmodelinglanguage(UML),itdescribesstaticframeworkofthemodelandpermitteddynamicoperations.Meanwhile,thesyntax,semanticruleofthemodelandcontractofeachusecaseinusecasediagramarerepresentednormativelythroughobjectconstraintlanguage(OCL).Ultimately,takingenterpriseinformationmanagementsoftwareasapracticalexampleofthemodel,itIIanalyzedtheconfidentiality,integrityandavailabilityofenterpriseinformation.Thelevelofsharedgroupsecuritymodelbroughtforwardinthepaperpossessespromisingfutureinapplication.Itrevealstherelativityanddynamicsof
您可能关注的文档
- 基于可持续发展视域的广西企业生态道德责任分析-analysis of enterprises' ecological moral responsibility in guangxi based on the perspective of sustainable development.docx
- 基于可持续建设理论的建筑工程招标文件分析-analysis of bidding documents of building engineering based on sustainable construction theory.docx
- 基于可持续利用的土地供需平衡分析——以高台县为例-analysis of land supply and demand balance based on sustainable utilization - taking gaotai county as an example.docx
- 基于可持续发展观的体验式旅游规划研究——以玉龙雪山裸美乐峡谷旅游规划为例-study on the planning of experience tourism based on the concept of sustainable development - taking the tourism planning of naked merlot canyon in yulong snow mountain as an example.docx
- 基于可持续视角的旅游用地模式分析——以乌鲁木齐南山风景区为例-analysis of tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续视角的旅游用地模式研究——以乌鲁木齐南山风景区为例-study on tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续发展理念城市老工业园的更新改造——以慈湖经济开发区为例-renovation of old urban industrial parks based on the concept of sustainable development - taking cihu economic development zone as an example.docx
- 基于可持续增长视角的上市公司融资策略分析-analysis of financing strategies of listed companies based on the perspective of sustainable growth.docx
- 基于可分级视频的联合信源信道编码技术分析-analysis of joint source-channel coding technology based on scalable video.docx
- 基于可穿戴计算的设备维护辅助系统自适应用户界面分析-adaptive user interface analysis of equipment maintenance assistance system based on wearable computing.docx
- 基于可拓学的晋煤集团寺河矿通风系统评价分析-evaluation and analysis of ventilation system in sihe mine of shanxi coal group based on extension theory.docx
- 基于可拓理论的中国上市航空公司绩效评价分析-performance evaluation analysis of chinese listed airlines based on extension theory.docx
- 基于可信计算的金融ic卡支付终端分析与设计-analysis and design of financial ic card payment terminal based on trusted computing.docx
- 基于可信kylin的局域网内usb存储设备集中访问控制技术分析-analysis of centralized access control technology for usb storage devices in local area network based on trusted kylin.docx
- 基于可信计算的入侵检测技术分析-analysis of intrusion detection technology based on trusted computing.docx
- 基于可信计算平台的自动信任协商分析-analysis of automatic trust negotiation based on trusted computing platform.docx
- 基于可信密码模块的数据安全管理系统关键技术分析-key technology analysis of data security management system based on trusted cryptographic module.docx
- 基于可用性研究的中国民族乐器新形制探索——以古筝交互界面设计为例-exploration of new forms of chinese national musical instruments based on usability research - taking the design of guzheng interactive interface as an example.docx
- 基于可召回机制的航空公司座位存量控制分析-analysis of airline seat stock control based on recall mechanism.docx
- 基于可用性的老年人手机界面设计分析-design and analysis of mobile phone interface for the elderly based on usability.docx
最近下载
- 苏教版(2024版)七年级上册生物期末复习知识点清单.docx VIP
- 修剪指甲教学课件.pptx VIP
- NB∕T 20006.4-2021 压水堆核电厂用合金钢 第4部分:反应堆压力容器接管嘴用锰-镍-钼钢锻件.pdf
- 《智慧仓储管理》课程标准.doc VIP
- 中国骨质疏松症及骨质疏松性骨折非药物干预防治指南(2025年版)PPT课件解读(2).docx VIP
- 13《少年中国说(节选)》 公开课一等奖创新教学设计.docx VIP
- 【行业研究报告】中国金融科技行业研究报告-2022年4月.pdf VIP
- 品种混杂退化原因PPT.ppt VIP
- 储罐内壁升降作业平台施工方案.doc VIP
- 【竞品分析文档】中国元宇宙产业竞品分析报告-2022年4月.pdf VIP
文档评论(0)