Method for controlling access to shared component of leveled partition

A technology of access control and sharing group, applied in the field of security authorization and management of computer resources, can solve problems such as errors, tedious authorization changes, heavy workload of system administrators, etc., and achieve the effect of integrity and unity

Inactive Publication Date: 2009-11-11
贵阳易特软件有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantages of users voluntarily granting access rights to their own documents to other users are obvious, but if the organizational structure of the enterprise or the security requirements of the system are in the process of changing, then it is necessary to carry out With a large number of tedious authorization changes, the work of the system administrator will become very heavy, and more importantly, errors are prone to occur and cause some unexpected security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling access to shared component of leveled partition
  • Method for controlling access to shared component of leveled partition
  • Method for controlling access to shared component of leveled partition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Now in conjunction with accompanying drawing and embodiment the present invention is described in further detail, embodiment refers to Figures 1 to 5 .

[0033] 1. The system is defined as the sharing group, user, document, and the upper and lower layer relationship network formed between the sharing group ( figure 1 ).

[0034] Systems = {Groups, Users, Documents}.

[0035] 2. A user is a subject that can independently access protected data or resources. It can be a person or a program or process. Here, it is simplified as a person. Users represent a user set, and U represents a user, namely:

[0036] Users={U 1 , U 2 ,...,U n}.

[0037] 3. Documents are protected data or resources, which are simplified as documents here. Documents is used to represent a document set, and D represents a document, namely:

[0038] Documents={D 1 ,D 2 ,...,D n}.

[0039] 4. For security reasons, according to the confidentiality requirements of departments and departments and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for controlling the access to a shared component of a leveled partition, wherein, the method does not allow the upper / lower level relations between any two shared components in a network to be circulated; each shared component comprises one or more than one users and one or more than one partitions, the users and the partitions are assigned an integrity level, and the documents are stored in the partitions; particularly, the integrity level is comparable numerals in sequence; and the integrity level of a document can be determined by the partition of the document, and the confidentiality level thereof can be determined by the level of the shared component in the network. The invention provides the shared component of a leveled partition for the construction of a security model, a complex problem can be divided into a few minor problems, therefore, the problems can be solved locally, and the invention has the advantages of decentralized rights and uniform availability, confidentiality and integrity.

Description

technical field [0001] The invention relates to a method for access control of hierarchical partition sharing groups, which belongs to the technical field of security authorization and management of computer resources. Background technique [0002] Access control refers to the different authorized access of the subject to the document itself or its resources according to certain control policies or permissions. Due to the needs of network transmission, the research side of access control develops rapidly, and many access control models have been proposed. Establishing a standardized access control model is necessary to implement strict access control policies. In the 1970s, Harrison, Ruzzo and Ullman proposed the HRU model. Then, Jones et al. proposed the Take-Grant model in 1976. Subsequently, in 1985, the US military proposed TCSEC, the trusted computer system evaluation criterion, which described two well-known access control strategies: discretionary access control mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G06F21/30
Inventor 李丹宁李丹王保华马新强宋剑
Owner 贵阳易特软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products