GB/T20270-IICS35.040L80目次前言..................................................................................................................................................................IV引言....................................................................................................................................................................V1范围................................................................................................................................................................12规范性引用文件............................................................................................................................................13术语、定义和缩略语.....................................................................................................................................13.1术语和定义.................................................................................................................................................13.2缩略语.........................................................................................................................................................24网络安全组成与相互关系.............................................................................................................................25网络安全功能基本要求.................................................................................................................................35.1身份鉴别.....................................................................................................................................................35.1.1用户标识..................................................................................................................................................35.1.2用户鉴别..................................................................................................................................................45.1.3用户-主体绑定.........................................................................................................................................45.1.4鉴别失败处理..........................................................................................................................................45.2自主访问控制.............................................................................................................................................45.2.1访问控制策略..........................................................................................................................................45.2.2访问控制功能..........................................................................................................................................45.2.3访问控制范围..........................................................................................................................................45.2.4访问控制粒度..........................................................................................................................................45.3标记.............................................................................................................................................................55.3.1主体标记........................................................................................................................