期刊文献+

信任管理中基于角色的委托授权研究进展 被引量:7

Research advances on role-based delegation authorization in trust management
在线阅读 下载PDF
导出
摘要 通过分析委托授权的本质特征和应用背景,综述了现有的基于角色的委托模型及其特征扩展,并给出了它们在信任管理中的研究进展和应用。最后,指出了目前所存在的问题和今后的研究方向。 By the analysis of delegation essential features and application background,this paper surveyed existing delegation models and characteristics extensions,as well as their research progresses and applications in trust management addressed.Finally,it indicated some existing issues and future research directions.
作者 张志勇 黄涛
出处 《计算机应用研究》 CSCD 北大核心 2008年第6期1601-1605,1610,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(60573035) 河南科技大学青年基金资助项目(2005QN019)
关键词 分布式计算 访问控制 委托授权 信任管理 证书链 distributed computing access control delegation authorization trust management certificate chain
  • 相关文献

参考文献27

  • 1BARKA E, SANDHU R S. Framework for role-based delegation models[C]//Proc of the 16th Annual Computer Security Application Conference. New Orleans : IEEE Computer Society Press ,2000:168-176.
  • 2ZHANG Xin-wen, OH S, SANDHU R S. PBDM:a flexible delegation model in RBAC [ C ]//Proc of the 8th ACM Symposium on Access Control Models and Technologies. New York : ACM Press, 2003 : 149-157.
  • 3BARKA E, SANDHU R S. A role-based delegation model and some extensions[ C]//Proc of the 23rd National Information Systems Security Conference. Baltimore, Maryland : NIST, 2000:101-114.
  • 4NA S Y, CHEON S H. Role delegation in role-based access control [ C ]//Proc of the 5th ACM Workshop on Role-based Access Control. New York: ACM Press, 2000:39-43.
  • 5ZHANG Zhi-yong, PU Jie-xin. Permission-role based delegation model and object-oriented modeling[ C]//Proc of China National Open Distributed and Parallel Computing Symposium. Beijing: Computer Engineer and Application, 2004:52-55.
  • 6BARKA E,SANDHU R S. Role-based delegation model/hierarchical roles ( RBDM1 ) [ C ]//Proc of the 20th Annual Computer Security Applications Conference. Washington DC : IEEE Computer Society, 2004 : 396 - 404.
  • 7ZHANG Long-hua, AHN G J, CHUB T. A rule-based framework for role-based delegation [ C ]//Proc of the 6th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2001 : 153-162.
  • 8赵庆松,孙玉芳,孙波.RPRDM:基于重复和部分角色的转授权模型[J].计算机研究与发展,2003,40(2):221-227. 被引量:32
  • 9徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 10叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17

二级参考文献100

  • 1张志勇.基于角色的访问控制模型及其面向对象的建模[J].计算机工程与设计,2004,25(8):1367-1369. 被引量:7
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 4Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 5Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 6Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 7Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 8Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 9Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 10Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf

共引文献158

同被引文献68

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部