期刊文献+

多域间安全互操作的信任传播策略 被引量:2

The Trust Propagation Policy for Secure Interoperability in Multi-Domain Environments
在线阅读 下载PDF
导出
摘要 多域环境下的访问控制是域间进行协作必须要解决的问题之一。本文对域间互操作的信任传播问题进行了分析,给出了自主策略、深度策略和角色策略。通过角色委托和角色映射,使角色的管理权和使用权分别传递。并对实现方案进行了讨论。 Access control in multi domain environments is one of the important issues of building coalition between domains. In this paper, the trust propagation issue for secure interoperability in multi domain environments is discussed. Then, the discretionary policy, depth policy and role policy are given. With role delegation and role mapping, the administrative and usage permissions of roles are transmitted separately. Finally, an implementation scheme is discussed.
出处 《计算机工程与科学》 CSCD 2005年第6期15-17,37,共4页 Computer Engineering & Science
关键词 访问控制 多域应用 信任 角色 access control multi domain trust role
  • 相关文献

参考文献7

  • 1M Blaze, J Feigenbaum, J Ioannidis, et al. The KeyNote Trust-Management. Version 2[R]. RFC 2704, 1999.
  • 2C Ellison, B Frantz, B Lampson, et al. SPKI Certificate Theory[R]. RFC 2693, 1999.
  • 3L Ninghui, W H Winsborough, J C Mitchell. Distributed Credential Chain Discovery in Trust Management (Extended Abstract) [A]. Proc 8th ACM Computer and Communication Security (CCS01)[C]. 2001. 156-165.
  • 4E Freudenthal,T Pesin, L Port, et al. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments[R]. Technical Report TR2001-819, New York University, 2001.
  • 5L Ninghui. Delegation Logic: A Logic-Based Approach to Distributed Authorization[J]. ACM Trans on Information and System Security, 2003, 6 (1): 128-171.
  • 6D D Clark, D R Wilson. A Comparison of Commercial and Military Computer Security Policies[A]. Proc of 1987 IEEE Symp on Security and Privacy[C]. 1987. 184-194.
  • 7D F Ferraiolo,R S Sandhu,S Gavrila, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Trans on Information and System Security, 2001,4(3): 224-274.

同被引文献13

  • 1苗莽.策略化的安全策略集中管理模型研究[J].网络安全技术与应用,2005(2):42-44. 被引量:3
  • 2洪帆,黎成兵.多域结盟环境下基于角色的访问控制[J].计算机工程与科学,2005,27(6):1-3. 被引量:3
  • 3章志明,张正球,余敏.一种基于RBAC的多个域之间安全访问控制[J].计算机工程,2005,31(15):135-136. 被引量:9
  • 4Shen Haibo, Hong Fan.A.Context-Aware Role-Based Access Control Model for Web Services[J].International Conference on e-Business Engineering, 2005, ( 10 ) : 220-223.
  • 5Eric Yuan,Jin Tong.Attribute Based Access Control for Web Services [J]. International Conference on Web Services, 2005, ( 16):561-569.
  • 6BARRERE F, BENZEKRI A, GRASSET F, et al. Automated interdomain security policy generation[ C ]//Proc of the 11 th Workshop of the HP OpenView University Association. Paris : [ s. n. ], 2004 : 20- 23.
  • 7SANDHU R. Role-based access control models[ J]. IEEE Computer, 1996,29(2) :38-47.
  • 8TMF GB917 v2.0, Service level agreement (SLA) management handbook[S]. 200d.
  • 9BARRERE F, BENZEKRI A, GRASSET F, et al. A multi-domains security policy distribution architecture for dynamic IP based VPN management[ C ]//Proc of the 3rd International Workshop on Policies for Distributed Systems and Networks. 2002:224-227.
  • 10CHAN K, SELIGSON J, DURHAM D,et al. COPS usage for policy provisioning(COPS-PR) [ EB/OL ]. ( 2001- 03 ). http ://www. ieff. org/rfc/rfc3084, txt? number = 3084.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部