freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

廈門市xxxx年初中生學業(yè)水平考試title(編輯修改稿)

2025-03-17 01:38 本頁面
 

【文章內(nèi)容簡介】 ss Control Inference problem occurs when users pose queries and deduce unauthorized information from the legitimate responses Security constraint processing for controlling inferences More recently there is work on controlling release information instead of controlling access to information ? Temporal Access Control Models Incorporates time parameter into the access control models ? Rolebased access control Controlling access based on roles of people and the activities they carry out。 Implemented in mercial systems ? Positive and Negative Authorizations Should negative authorizations be explicitly specified? How can conflicts be resolved? Some Examples ? Temporal Access Control After 1/1/05, only doctors have access to medical records ? Rolebased Access Control Manager has access to salary information Project leader has access to project budgets, but he does not have access to salary information What happens if the manager is also the project leader? ? Positive and Negative Authorizations John has write access to EMP John does not have read access to DEPT John does not have write access to Salary attribute in EMP How are conflicts resolved? Privacy Constraints / Access Control Rules ? Privacy constraints processing Simple Constraint: an attribute of a document is private Contentbased constraint: If document contains information about X, then it is private Associationbased Constraint: Two or more documents taken together is private。 individually each document is public Release constraint: After X is released Y bees private ? Augment a database system with a privacy controller for constraint processing Integrated Architecture for Privacy Constraint Processing User Interface Manager Constraint Manager Privacy Constraints Query Processor: Constraints during query and release operations Update Processor: Constraints during update operation XML Database Design Tool Constraints during database design operation Database Relational DBMS Other Policies ? Trust Policies To what extent do you trust the source of the data How can trust be propagated Adding trust value to each piece of data A trusts B and B trusts C, does this mean A trusts C? A department head sends messages to all the faculty。 however he/she may not trust a particular person Developing a language to specify trust ? Integrity Policies Maintaining the quality of the data Adding an attribute to each piece of data to specify the quality Quality also depends on how much you trust the source Algebra for data quality Access Control in Databases: Next Steps ? Access Control in Databases will continue to be very important We also need to examine alternatives ? We need new kinds of access control models 1975 models may not be suitable for emerging applications such as semantic web, emerce and stream data management Rolebased access control has bee very popular and is implemented now in mercial systems. What variations of this model are appropriate for emerging applications? ? Endtoend security is critical We cannot have secure databases and have insecure works and middleware。 Composability ? Flexible security policies Confidentiality, Authenticity, Completeness, Integrity, Trust, Privacy, Data Quality, etc. Policies ? Need to Know to Need to Share ? RBAC ? UCON ? ABAC ? Dissemination ? Risk based access control ? Trust Management/Credential/Disclosure ? Directions ? Major conferences for Policy and Access Control: IEEE Policy Workshop ACM SACMAT Need to Know to Need to Share ? Need to know policies during the cold war。 even if the user has access, does the user have a need to know? ? Post 9/11 the emphasis is on need to share User may not have access, but needs the data ? Do we give the data to the user and then analyze the consequences ? Do we analyze the consequences and then determine the actions to
點擊復制文檔內(nèi)容
語文相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖片鄂ICP備17016276號-1