期刊文献+

网格计算环境的一种基于信任度的授权委托机制 被引量:7

Authorization delegation mechanism based trust level in grid computing
在线阅读 下载PDF
导出
摘要 针对网格计算环境下跨域授权过程的委托服务需求,在现有的RBDM和RT模型基础上,结合主观信任机制对委托过程进行信任协商,实现角色和权限的授权委托过程,并给出了细粒度的授权委托策略,最后对委托过程中的主观信任机制进行仿真,证实了使用信任度实现对委托过程控制的有效性。 To meet the demand of the delegation service during multi-domain authorization in grid computing, the delegation negotiation process is presented to realize the authorization delegation of role and permission based on the RBDM and RT model through the introduction of trust levels. The fine-grain authorization delegation policy is given. Finally, the simulation is given to prove the feasibility of the delegation model with trust level.
出处 《通信学报》 EI CSCD 北大核心 2008年第9期10-17,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60573141,60773041) 国家高技术研究发展计划(“863”计划)基金资助项目(2006AA01Z201,2007AA01Z404,2007AA01Z478) 江苏省高技术研究计划基金资助项目(BG2006001) 南京市高科技基金资助项目(2007软资127) 现代通信国家重点实验室基金资助项目(9140C1105040805) 江苏省计算机信息处理技术重点实验室基金资助项目(kjs06006) 江苏省高校自然科学研究计划基金资助项目(07KJB520083)~~
关键词 网格计算 信任度 授权委托 基于角色访问控制 grid computing trust level authorization delegation RBAC
  • 相关文献

参考文献11

  • 1ZHANG L H, AHN G J, CHUB T. A rule-based framework for role-based delegation[A]. Proc of the 6^th ACM Symp on Access Control Models and Technologies[C]. New York, 2001.153-162.
  • 2BARKA E, SANDHU R. Framework for role-basexi delegation models[A]. Proceedings of the 16th Annual Computer Security Application Conference[C].2000. 168-176.
  • 3SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[J].Computer, 1996,29(2):38- 47.
  • 4BARKA E, SANDHU R. A role-based delegation model and some extensions[A]. Proceedings of the 23rd National Information Systems Security Conference(NISSC 2000) [C]. Baltimore, 2000.
  • 5BARKA E, SANDHU R. Role-based delegation model/hierarchical roles (RBDMI) [A]. Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04) [C].2004. 396-404.
  • 6ZHANG L H, AHN G J, CHU B T. A rule-based frame-work for role-based delegafion[J].ACM Trails on Information and System Security, 2003,6(3):404-441.
  • 7JAMES B, RAFAE B, ELISA B, E, et al. Access-control language for multi-domain environments[J]. IEEE Internet Computing, 2004,8(6): 40-50.
  • 8LI N H, WINSBOROUGH W H, MITCHELL J C. Distributed credential chain discovery in trust management[J]. Journal of Computer Security, 2003, 11(1): 35-86.
  • 9LI NINGHUI, MITCHELL J C, WINSBOROUGH W H. Design of a role-based trust management framework[A]. Proc IEEE Symposium on Security and Privacy[C]. CA, 2002. 114-130.
  • 10张煜,张文燚,李先贤,怀进鹏.多自治域协同环境中群组通信的安全访问控制[J].计算机研究与发展,2005,42(9):1558-1563. 被引量:4

二级参考文献29

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Li Ninghui, W. H. Winsborough, J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35~86.
  • 3Li Ninghui, J. C. Mitchell, W. H. Winsborough. Design of a role-based trust management framework. In: Proc. IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 2002.
  • 4C.Wong, M. Gouda, S. Lam. Secure group communications using key graphs. IEEE/ACM Trans. Networking, 2000, 8(1):16~30.
  • 5P. Judge, M. Ammar. Gothic: A group access control architecture for secure multicast and anycast. The 21st Annual Joint Conf. IEEE Computer and Communications Societies, New York, 2002.
  • 6P. McDaniel. Policy management in secure group communication:[Ph. D. dissertation ]. Ann Arbor, MI: Unive rsity of Michigan,2001.
  • 7D. Shands, R. Yee, J. Jacobs, et al. Secure virtual enclaves:Supporting coalition use of distributed application technologies. In:Proc. DARPA Information Survivability Conf. & Exposition.New York: ACM Press, 2000.
  • 8O. Rodeh, K. P. Birman. The architecture and performance of security protocols in the ensemble group communication system:Using diamonds to guard the castle. ACM Trans. Information and System Security, 2001, 4(3): 289~31.
  • 9D. A. Agarwal, O. Chevassut, M. R. Thompson, et al. An integrated solution for secure group communication in wide-area networks. The 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, 2001.
  • 10M. Thompson. Certificate-based access control for widely distributed resources. In: Proc. the 8th Usenix Security Symposium. Los Alamitos, CA: IEEE Computer Society Press,1999.

共引文献35

同被引文献38

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部