Journal of Shanghai Jiaotong University ›› 2013, Vol. 47 ›› Issue (04): 579-583.
• Automation Technique, Computer Technology • Previous Articles Next Articles
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2
Received:2012-06-26
Online:2013-04-28
Published:2013-04-28
CLC Number:
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition[J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 579-583.
| [1]Ruj S, Nayak A, Stojmenovice I. DACC:Distributed access control in clouds[C]∥ IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha:IEEE TrustCom, 2011:9198.[2]NIST. Role Based Access Control[EB/OL]. (201206). http://csrc.nist.gov/groups/SNS/rbac/.[3]邹林, 潘理. 基于角色访问控制系统中角色结构安全性分析问题的模型检测验证[J]. 上海交通大学学报, 2010,44(9):11921196.ZOU Lin, PAN Li. RRASAP security verification based on model checking for RBAC access control systems[J]. Journal of Shanghai Jiaotong University, 2010, 44(9): 11921196.[4]王小明, 付红, 张立臣. 基于属性的访问控制研究进展[J]. 电子学报, 2010,38(7):16601667.WANG Xiaoming, FU Hong, ZHANG Lichen. Research progress on attributebased access control[J]. Acta Electronica Sinica, 2010, 38(7): 16601667.[5]Bonatti P, Vimercati S, Samarati P, et al. An algebra for composing access control policies[J]. ACM Transactions on Information and System Security, 2002, 5(1): 135.[6]林莉, 怀进鹏, 李先贤. 基于属性的访问策略合成代数[J]. 软件学报, 2009,2(2): 403414.LIN Li, HUAI Jinpeng, LI Xianxian. Attributebased access control policies composition algebra[J]. Journal of Software, 2009, 2(2): 403414.[7]Rissanen E. eXtensible Access Control Markup Language(XACML)[EB/OL].(2012). http://docs.oasisopen.org/xacml/3.0/xacml3.0corespecen.html.[8]Rao P, Lin Dan, Bertino E, et al. An algebra for finegrained integration of XACML policies[C] ∥Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2009: 6372.[9]SourceForge. JavaBDD Reference[EB/OL]. (200710).http://javabdd.sourceforge.net/.[10]Li Ninghui, Lin Dan, Rao P, et al. Access control policy combining: Theory meets practice[C]∥ Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2009:135144.[11]Lin Dan, Bertino E, Li Ninghui, et al. EXAMa comprehensive environment for the analysis of access control policies[J]. International Journal of Information Security, 2010, 9(4): 253273.[12]石纯一, 王家廞. 数理逻辑与集合论 [M]. 2版. 北京:清华大学出版社, 2000:129160.[13]Sun Microsystem. XACML implementation[EB/OL]. (200606).http://sunxacml.sourceforge.net/. |
| [1] | Xu Luzhen, Yan Haoyin, He Maokui, Guo Zixian, Zhou Yeping, Liu Peiqi, Zhang Jie, Dai Lirong. Multi-Frame Cross-Channel Attention and Speaker Diarization Based Speaker-Attributed Automatic Speech Recognition System for Multi-Channel Multi-Party Meeting Transcription [J]. J Shanghai Jiaotong Univ Sci, 2026, 31(2): 298-304. |
| [2] | FAN Xing, GE Fei, JIA Wenwen, XIAO Fangwei. Vehicle Reidentification Based on Multi-Attribute Adaptive Polymerization Network [J]. Journal of Shanghai Jiao Tong University, 2026, 60(1): 123-132. |
| [3] | XU Han, ZHAO Jiahuan, MA Shanbin, OUYANG Yi, WANG Zhuang, JIANG Hongru. Air Combat Target Threat Assessment Method Based on Combined Weighting-ITOPSIS-GRA [J]. Air & Space Defense, 2026, 9(1): 115-122. |
| [4] | ZHANG Xiaokun, YAN Tianxu, PENG Guopeng, WANG Long, ZHANG Yixuan, ZHAO Xunwang. Inversion and Interpretation of Target Electromagnetic Scattering Characteristics Based on Measurement and Computation [J]. Air & Space Defense, 2025, 8(6): 85-93. |
| [5] | REN Haohao, CUI Shan, JIANG Xinyu, LIANG Shuyi, ZHOU Yun. Occluded SAR Target Recognition Based on Multi-View Mutual Learning Network [J]. Air & Space Defense, 2025, 8(6): 25-34. |
| [6] | LI Zhenkun, YU Qiuyang, WEI Yanjun, TIAN Shuxin. Cost Modeling and Analysis of Integrated Energy Microgrid Group Participation in Frequency Regulation Auxiliary Service Market Based on CPSS [J]. Journal of Shanghai Jiao Tong University, 2024, 58(6): 893-903. |
| [7] | ZHANG Yiming (张-鸣),HOU Junjie1* (侯俊杰),ZHONG Shaowen2 (钟少文). Optimization of Group Multiattribute Decision-Making Model in Commercial Space Investment [J]. J Shanghai Jiaotong Univ Sci, 2023, 28(6): 831-840. |
| [8] | SU Hongjia, LUO Yucheng, LIU Fei. Review of Equipment Effectiveness Evaluation and Supporting Technologies [J]. Air & Space Defense, 2023, 6(3): 29-38. |
| [9] | DENG Junyong, JIANG Lin . BFM: A Bus-Like Data Feedback Mechanism Between Graphics Processor and Host CPU [J]. Journal of Shanghai Jiao Tong University(Science), 2020, 25(5): 615-622. |
| [10] | LI Zhan-dong, GU Ya-ping, LIU Yi-kun, WANG Ke-liang, ZHOU Zhi-jun, WU Jing-chun, LI Wei. Prediction of Natural Gas Hydrate Dessert Reservoir Based on Attribute Fusion Technology — Take Area A of Southwest Tai Basin in the South China Sea as an Example [J]. Ocean Engineering Equipment and Technology, 2018, 5(增刊): 1-5. |
| [11] | LU Cheng,XU Tingxue,WANG Hong. Fault Diagnosis of Terminal Guidance Radar Based on Attribute Granulation Clustering and Echo State Network [J]. Journal of Shanghai Jiao Tong University, 2018, 52(9): 1112-1119. |
| [12] | ZHENG Bo (郑波), LI Yanfeng (李彦锋), FU Guozhong (付国忠). Discretization Algorithm Based on Particle Swarm Optimization and Its Application in Attributes Reduction for Fault Data [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 691-695. |
| [13] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
| [14] | LI Yupeng1,LIAN Xiaozhen1,LU Cheng1,CHU Xuening2. Evaluation Approach to Rank Module Partition Schemes of Complex Products Based on Hybrid Fuzzy Multi-Attribute Decision Making [J]. Journal of Shanghai Jiao Tong University, 2017, 51(11): 1374-1382. |
| [15] | HUANG Jiaxuan (黄嘉烜), JIN Xiaogang* (金小刚). Continuous Multiplicative Attribute Graph Model [J]. Journal of shanghai Jiaotong University (Science), 2017, 22(1): 87-091. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||