期刊文献+

一种基于企业网格的工作流安全认证模型

Workflow Security Authorization Model Based on Enterprise Grid
在线阅读 下载PDF
导出
摘要 基于企业网格具有多层次,多任务,多用户以及需要对不同访问采取不同的权限限制等特点,该文提出了一种采用工作流安全认证模型。在网格环境中,任务执行时需要有特定权限,如果赋予权限不够,则不足以完成任务;如果赋予权限过大,对企业安全又起到了威胁。因此该模型在执行一个任务的过程中,针对不同种类的企业客户及不同的授权任务指定一个适当的具体权限,从而确保任务安全,高效的完成。 An workflow safety authorization service model is proposed, because enterprise grid has characteristics of multi-tier and multiuser and different right limitation for different user at different stage.In the grid environment, when a task is carried out it needs specific right.If delegated rights are insufficient, the task cannot be complete;if delegated rights are excessive, it maybe bring security threats for enterprise safety.wherefore when a task is executed, this model designate a specific right for different enterprise user and different authorization task.Insure the task to be completed safely and efficiently.
作者 杨青 宋进 YANG Qing, SONG Jin(School of Electronic and Information, Lanzhou Jiaotong University, Lanzhou 730070, China)
出处 《电脑知识与技术》 2010年第1期62-63,79,共3页 Computer Knowledge and Technology
关键词 网格安全 身份认证 访问控制 有限授权 网格工作流 grid security identity authentication access control finity authorization grid workflow
  • 相关文献

参考文献6

  • 1应宏.基于网格服务的工作流技术[J].计算机工程与设计,2005,26(10):2671-2673. 被引量:7
  • 2Jlshy Joseph,Craig Fellenstein.网格计算[M].北京:清华大学出版社,2005.
  • 3高全泉.关于网格及其它分布计算技术的若干问题的讨论[J].计算机科学,2003,30(2):17-21. 被引量:5
  • 4赵悦.网格技术及其安全构架[J].中国国防科技信息中心,2006,29(4):50-500.
  • 5WeiLiu,Zong Tianliu,Wei Qintong.Agent-oriented modeling for grid sercive[R].Hong Kong,Proceedings of the Sixth International Conference on Machine Learning and Cybernetics,2007(8):19-22.
  • 6Deng Hong,Chen Li,Wang Chentao.A grid-based scheduling system of manufacturing resources for a virtual enterprise[R].International journal of Advanced Manufacturing Technology,2006(28):137-141.

二级参考文献19

  • 1[1]Foster I,Kesselman C,Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Organizations,Intl. J. Supercomputer Applications, 2001,15(3)
  • 2[3]Aiken R,Carey M,Carpenter B,Foster I,et al. Network Policy and Services: A Report of a Workshop on Middlewar. IETF,RFC2768,2000. http://www. ietf. org/rfc/rfc2768. txt.
  • 3[5]Enterprise Javabeans Specification,Version 2.0(EJB 2.0 specification). http://java. sun. com/products/ejb.
  • 4[6]Java2 Platform, Enterprise Edition Specification Version 1.3. http://java. sun. com/j2ee/docs. html
  • 5[7]Christiansen B O,Cppello P,et al,Javelin: Internet-Based Parallel Computing Using Java. http: // www. cs. ucsb. edu/research/javelin.
  • 6[8]Vahdat A,Belani E,et al. WebOS: Operating System Services For Wide Area Applications. In: 7th Symposium on High Performance Distributed Computing ,July, 1998
  • 7[9]Clarke I,Sanderg O,et al. Freenet: A Distributed Anonymous Information Storageand Retrieval System. In: ICSI Workshop on Design Issues in Anonymity and Unobservability,1999
  • 8[10]Grimshaw A, Wulf W. Legion--A View from 50,000 Feet. In:Proc. 5th IEEE Symposium on High Performance Distributed Computing, 1996, IEEE Press, 1996.89 ~ 99
  • 9[11]http://www. sun. com/jini/whitepapers/architecture. html
  • 10Bivens H P. Grid workflow[EB/OL] .www.zuni.cs.vt.edu/gfidcomputing/papers/draft-bivens-grid-workflow.pdf.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部