信息网络安全 ›› 2016, Vol. 16 ›› Issue (12): 19-27.doi: 10.3969/j.issn.1671-1122.2016.12.004

• • 上一篇    下一篇

访问控制技术现状及展望

罗霄峰1, 王文贤2,3(), 罗万伯3   

  1. 1. 四川大学锦江学院,四川成都610065
    2. 四川大学网络空间安全研究院,四川成都610065
    3. 四川大学计算机学院,四川成都610065
  • 收稿日期:2016-07-01 出版日期:2016-12-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 罗霄峰(1974—),男,四川,讲师,博士,主要研究方向为信息安全;王文贤(1978—),男,福建,讲师,博士,主要研究方向为网络空间安全、舆情分析和挖掘;罗万伯(1946—),男,四川,教授,硕士,主要研究方向为信息安全,计算机应用。

  • 基金资助:
    国家科技支撑计划[2012BAH18B05]

The Retrospect and Prospect of Access Control Technology

Xiaofeng LUO1, Wenxian WANG2,3(), Wanbo LUO3   

  1. 1. School of Jinjiang, Sichuan University, Chengdu Sichuan 610065, China
    2. Cybersecurity Research Institute, Sichuan University, Chengdu Sichuan 610065, China
    3. School of Computer Science, Sichuan University, Chengdu Sichuan 610065, China
  • Received:2016-07-01 Online:2016-12-20 Published:2020-05-13

摘要:

访问控制是信息安全的关键技术之一,它依赖于其他安全服务并与这些服务共存于信息系统中,从而保障信息的安全。为了有助于访问控制技术研究、发展及推广应用,文章在对访问控制技术原理及发展历程研究的基础上,介绍了当前实际应用的主流访问控制技术,如自主访问控制、强制访问控制和基于角色的访问控制,并探讨了访问控制技术的发展方向,包括基于属性和策略的访问控制、风险自适应的访问控制和新一代访问控制。针对访问控制技术的发展和实际应用情况,提出应该在加强有关基础研究的同时,开展符合中国国情的访问控制标准化、规范化研究和建设。

关键词: 访问控制, 访问控制策略, 风险自适应, 安全策略

Abstract:

Access control is one of the key technologies of information security. It relies on other security services and coexists with these services in the information system, so as to ensure the security of information. In order to help research, development and adoption of access control technologies, based on study of access control technology and its development course, some meaningful access control technologies in practical applications are introduced, like discretionary access control, mandatory access control and role-based access control. Then some directions of access control technology development are discussed, including attribute and policy-based access control, risk-adaptable access control and next generation access control. For the development and practical application of access control, we should strengthen the basic research on the same time, in line with the situation in China to carry out access control standardization, deployment, application research and construction.

Key words: access control, access control policy, risk adaptable, security policy

中图分类号: