{"title":"基于时间的使用控制模型及其启示","authors":"Jianjie Fang, Junhua Zou","doi":"10.1109/SECTECH.2008.23","DOIUrl":null,"url":null,"abstract":"Some modern information systems require temporal and privilege consuming usage of digital objects, but usage control model (UCON) can¿t resolve it most conveniently. So in order to meet these requirements, the author introduces a new access control model - times-based usage control (TUCON). First, the paper introduces the TUCON model and then gives the working flow of the TUCON. Finally the implementation of TUCON is explored.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Times-Based Usage Control Model and Its Implication\",\"authors\":\"Jianjie Fang, Junhua Zou\",\"doi\":\"10.1109/SECTECH.2008.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Some modern information systems require temporal and privilege consuming usage of digital objects, but usage control model (UCON) can¿t resolve it most conveniently. So in order to meet these requirements, the author introduces a new access control model - times-based usage control (TUCON). First, the paper introduces the TUCON model and then gives the working flow of the TUCON. Finally the implementation of TUCON is explored.\",\"PeriodicalId\":377461,\"journal\":{\"name\":\"2008 International Conference on Security Technology\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2008.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Times-Based Usage Control Model and Its Implication
Some modern information systems require temporal and privilege consuming usage of digital objects, but usage control model (UCON) can¿t resolve it most conveniently. So in order to meet these requirements, the author introduces a new access control model - times-based usage control (TUCON). First, the paper introduces the TUCON model and then gives the working flow of the TUCON. Finally the implementation of TUCON is explored.