CN114205118A - 基于数据安全法范畴的数据访问控制分析方法 - Google Patents
基于数据安全法范畴的数据访问控制分析方法 Download PDFInfo
- Publication number
- CN114205118A CN114205118A CN202111366813.9A CN202111366813A CN114205118A CN 114205118 A CN114205118 A CN 114205118A CN 202111366813 A CN202111366813 A CN 202111366813A CN 114205118 A CN114205118 A CN 114205118A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- access
- sensitive data
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000004458 analytical method Methods 0.000 title claims abstract description 21
- 238000012545 processing Methods 0.000 claims abstract description 17
- 238000011217 control strategy Methods 0.000 claims abstract description 8
- 230000035945 sensitivity Effects 0.000 claims abstract description 8
- 230000008569 process Effects 0.000 claims description 9
- 238000000586 desensitisation Methods 0.000 claims description 8
- 238000007405 data analysis Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 4
- 238000004061 bleaching Methods 0.000 claims description 3
- 230000008030 elimination Effects 0.000 claims description 3
- 238000003379 elimination reaction Methods 0.000 claims description 3
- 238000005406 washing Methods 0.000 abstract 1
- 238000007726 management method Methods 0.000 description 20
- 238000012550 audit Methods 0.000 description 9
- 230000006399 behavior Effects 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 238000012423 maintenance Methods 0.000 description 6
- 230000008520 organization Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000008450 motivation Effects 0.000 description 2
- 238000007670 refining Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000012466 permeate Substances 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000002269 spontaneous effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111366813.9A CN114205118B (zh) | 2021-11-17 | 2021-11-17 | 基于数据安全法范畴的数据访问控制分析方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111366813.9A CN114205118B (zh) | 2021-11-17 | 2021-11-17 | 基于数据安全法范畴的数据访问控制分析方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114205118A true CN114205118A (zh) | 2022-03-18 |
CN114205118B CN114205118B (zh) | 2023-10-27 |
Family
ID=80648023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111366813.9A Active CN114205118B (zh) | 2021-11-17 | 2021-11-17 | 基于数据安全法范畴的数据访问控制分析方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114205118B (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117336083A (zh) * | 2023-10-27 | 2024-01-02 | 河北赛克普泰计算机咨询服务有限公司 | 一种网络安全等级保护中的通信方法及系统 |
CN118013502A (zh) * | 2024-03-13 | 2024-05-10 | 北京华档致远科技有限公司 | 基于数据要素的数据资产安全保护方法及系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1953454A (zh) * | 2006-10-27 | 2007-04-25 | 北京启明星辰信息技术有限公司 | 基于角色管理的安全审计方法及系统 |
CN1977227A (zh) * | 2003-01-13 | 2007-06-06 | 甲骨文国际公司 | 属性相关的访问控制策略 |
CN108418676A (zh) * | 2018-01-26 | 2018-08-17 | 山东超越数控电子股份有限公司 | 一种基于权限的数据脱敏方法 |
CN110020553A (zh) * | 2019-04-12 | 2019-07-16 | 山东浪潮云信息技术有限公司 | 一种保护敏感数据的方法及系统 |
CN110795761A (zh) * | 2019-10-29 | 2020-02-14 | 国网山东省电力公司信息通信公司 | 一种面向泛在电力物联网敏感数据的动态脱敏方法 |
CN112364377A (zh) * | 2020-11-11 | 2021-02-12 | 国网山东省电力公司电力科学研究院 | 一种适应于电力行业的数据分类分级安全防护系统 |
CN113378225A (zh) * | 2021-06-24 | 2021-09-10 | 平安普惠企业管理有限公司 | 线上敏感数据获取方法、装置、电子设备及存储介质 |
-
2021
- 2021-11-17 CN CN202111366813.9A patent/CN114205118B/zh active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1977227A (zh) * | 2003-01-13 | 2007-06-06 | 甲骨文国际公司 | 属性相关的访问控制策略 |
CN1953454A (zh) * | 2006-10-27 | 2007-04-25 | 北京启明星辰信息技术有限公司 | 基于角色管理的安全审计方法及系统 |
CN108418676A (zh) * | 2018-01-26 | 2018-08-17 | 山东超越数控电子股份有限公司 | 一种基于权限的数据脱敏方法 |
CN110020553A (zh) * | 2019-04-12 | 2019-07-16 | 山东浪潮云信息技术有限公司 | 一种保护敏感数据的方法及系统 |
CN110795761A (zh) * | 2019-10-29 | 2020-02-14 | 国网山东省电力公司信息通信公司 | 一种面向泛在电力物联网敏感数据的动态脱敏方法 |
CN112364377A (zh) * | 2020-11-11 | 2021-02-12 | 国网山东省电力公司电力科学研究院 | 一种适应于电力行业的数据分类分级安全防护系统 |
CN113378225A (zh) * | 2021-06-24 | 2021-09-10 | 平安普惠企业管理有限公司 | 线上敏感数据获取方法、装置、电子设备及存储介质 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117336083A (zh) * | 2023-10-27 | 2024-01-02 | 河北赛克普泰计算机咨询服务有限公司 | 一种网络安全等级保护中的通信方法及系统 |
CN117336083B (zh) * | 2023-10-27 | 2024-05-14 | 河北赛克普泰计算机咨询服务有限公司 | 一种网络安全等级保护中的通信方法及系统 |
CN118013502A (zh) * | 2024-03-13 | 2024-05-10 | 北京华档致远科技有限公司 | 基于数据要素的数据资产安全保护方法及系统 |
CN118013502B (zh) * | 2024-03-13 | 2024-07-12 | 北京华档致远科技有限公司 | 基于数据要素的数据资产安全保护方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN114205118B (zh) | 2023-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8607353B2 (en) | System and method for performing threat assessments using situational awareness | |
CN115733681A (zh) | 一种防止数据丢失的数据安全管理平台 | |
CN114205118B (zh) | 基于数据安全法范畴的数据访问控制分析方法 | |
Vieira et al. | Towards a security benchmark for database management systems | |
CN114157457A (zh) | 一种网络数据信息安全用的权限申请及监控方法 | |
Yamin et al. | Implementation of insider threat detection system using honeypot based sensors and threat analytics | |
Sun et al. | A data-driven evaluation for insider threats | |
Nostro et al. | A methodology and supporting techniques for the quantitative assessment of insider threats | |
Yerjanov et al. | Legal issues related to combating cybercrime: Experience of the Republic of Kazakhstan | |
Singh et al. | Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases | |
CN117494154A (zh) | 一种基于零信任的电力大数据安全管理方法及系统 | |
CN117333026A (zh) | 一种基于能源大数据的风险辨识方法 | |
Srivastava et al. | Verity: Blockchains to detect insider attacks in DBMS | |
CN108600178A (zh) | 一种征信数据的安全保障方法及系统、征信平台 | |
Kamra et al. | Responding to anomalous database requests | |
Sriramoju et al. | Predicting The Misusability Of Data From Malicious Insiders | |
Soma et al. | Computer Crime: Substantive Statutes & (and) Technical & (and) Legal Search Considerations | |
CN118211269B (zh) | 数据微粒度划分与访问控制方法和系统 | |
CN118427843B (zh) | 一种数据安全能力侦测方法及系统 | |
US12028376B2 (en) | Systems and methods for creation, management, and storage of honeyrecords | |
Dempsey et al. | Technologies that can protect privacy as information is shared to combat terrorism | |
CN116662548A (zh) | 数据库维护方法、装置、电子设备及可读存储介质 | |
Mariuța et al. | Monitoring And Controling The Access To Classified Economic Data | |
Heatley et al. | Data mining computer audit logs to detect computer misuse | |
Phyo et al. | A Framework For Monitoring Insider Misuse Of It Applications. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Room 406, No.1, Yichuang street, Zhongxin Guangzhou Knowledge City, Huangpu District, Guangzhou, Guangdong 510000 Patentee after: Southern Power Grid Digital Grid Research Institute Co.,Ltd. Country or region after: China Address before: Room 406, No.1, Yichuang street, Zhongxin Guangzhou Knowledge City, Huangpu District, Guangzhou, Guangdong 510000 Patentee before: Southern Power Grid Digital Grid Research Institute Co.,Ltd. Country or region before: China |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240904 Address after: 518101, 3rd Floor, Building 40, Baotian Industrial Zone, Chentian Community, Xixiang Street, Bao'an District, Shenzhen City, Guangdong Province Patentee after: China Southern Power Grid Digital Platform Technology (Guangdong) Co.,Ltd. Country or region after: China Address before: Room 406, No.1, Yichuang street, Zhongxin Guangzhou Knowledge City, Huangpu District, Guangzhou, Guangdong 510000 Patentee before: Southern Power Grid Digital Grid Research Institute Co.,Ltd. Country or region before: China |