Font Size: a A A

Study Of Data Exchange Control For Water Industry Based On MBDAC Model

Posted on:2016-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:P FuFull Text:PDF
GTID:2309330461479625Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
At present, a lot of sensitive information and technology through the computer to control and management. How to ensure that these are not people steal and damage, namely how to make them safe, is a hot research topic in today’s computer technology. ISO on the network security standard (ISO7498-2) defines the five hierarchical security services (identity authentication, access control service, data confidentiality, data integrity, service, non-repudiation service), access control is one of the important part of. The so-called access control, is somehow explicitly permit or restrict access to and scope, thereby limiting access to key resources, prevent illegal users intrusion or damage the legitimate user accidentally operation.Over the past 20 years, people have made great achievements in the field of access control of research, there are a lot of access control model was proposed. In the 1970 s, Harrison, Ruzzo and Ullman HRU model is put forward. Then, Jones and others Take-Grant model is put forward in 1976. Later on, and there was a famous discretionary access control model and mandatory access control model proposed.These early efforts to see the end of the literature.In recent years popular access control model is established in 1992 by Ferraiolo and Kuhn proposed role-based access control.Through the study of these access control models can be seen,access control model are set out to protect the resources from the system’s point of view, But it did not consider the execution context during permissions control. With the database, network and distributed computing development, organizational tasks to further automate service-related information to further computerization, which spurred the subject and the object of the attention of the security issues from a separate computer system static protection, transferred to the protection of dynamic authorization with the execution of the task. This paper studies the defects of the existing data exchange platform data security, and focuses on a provincial-level access to data in a data exchange system in the actual control technology ideas, principles and implementation methods,then presents a based on the mapping of data access control model(MBDAC).
Keywords/Search Tags:Data exchange system, Waterway transportation industry, Data source, Data sets, Access control
PDF Full Text Request
Related items