期刊文献+

制造网格动态访问控制策略的研究与应用

Dynamic authorization policy of manufacturing grid
在线阅读 下载PDF
导出
摘要 为了确保制造网格中共享服务的安全,加强制造网格动态环境下的访问控制,提出一种根据任务状态及制造网格节点间任务关系动态调整用户的可执行服务的动态访问控制机制。该授权机制基于TBAC模型的基本思想,考虑任务这一上下文环境对访问控制的约束,针对制造网格节点任务特性,定义动态授权中的节点任务之间的关系,确定了任务中需要使用的服务的可执行实体授权规则。实例分析证明了该授权机制应用于制造网格系统可有效加强制造网格共享服务的访问控制。 In order to ensure the security of the sharing service in the Manufacturing Grid(MG),an dynamic authorization mechanism was presented to realize the automatical adjustment of user's authorized services according to the status of tasks or the relationship between the tasks. The task context is consid- ered as one of the restraint conditions in the dynamic authorization mechanism in the MG like the Task based Access Control(TBAC). The relationships between the tasks are defined according to the characteristic of the Manufacturing Grid task. The rules to authorize the entities to use the services in the task are also defined. A case study was presented to verify this mechanism could enhance the access control of the sharing service in the Manufacturing Grid.
出处 《机械设计与制造》 北大核心 2010年第1期262-264,共3页 Machinery Design & Manufacture
基金 上海市科委科技攻关项目资助(08DZ1120600) 上海市重点学科建设项目资助(Y0102)
关键词 制造网格 访问控制 任务 动态授权 Manufacturing grid Access control Task Dynamic authorization
  • 相关文献

参考文献9

二级参考文献21

  • 1Deloaeh S A, Wood M F, Sparkman C H. Multiagent Systems.Int l J Software Eng and Knowledge Eng, 2001,11 (3) : 231-258.
  • 2Foster I,Kesselman C,Tueeke S The Anatomy of the Grid:Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications, 2001, 15 (3) : 200-222.
  • 3Foster I, Kesselman C, Tuecke G,et al. A Security Architecture for Computational Grids. In: ACM Conference on Computer and Communications Security Conference, 1998. 83-91.
  • 4部志辉,陈渝,刘鹏.向格计算[M].北京:清华大学出版社,2002.67~80.
  • 5Pearlman L, Welch V, Foster I,et al. A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
  • 6Alfierl R, Cecchini R, et al. VOMS, an Authorization System for Virtual Organizations. http://gridauth. infn. it/docs/VOMSSantiago. pdf.
  • 7Johnston W, Mudumbai S, Thompson M. Authorization and Attribute Certificates for Widely Distributed Access Control. In:Proceedings of IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborataive Enterprises,1998.
  • 8Chadwick D W, Otenko A. The PERMIS X. 509 role-based privilege management infrastructure. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies,Monterey, Califorinia, USA. 2002.
  • 9Sandhu R, Coyne E, Feinstein H,et al. Role-Based Access Control Models. IEEE Computer, 1996,29(2) :38-47.
  • 10Most6faoui G K,Br-zillon P. A Generic Framework for ContextBased Distributed Authorizations. InzProc. 4th International andInterdisciplinary Conference on Modeling and Using Context(Context'03), LNAI 2680, 2003. 204-217.

共引文献344

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部