期刊文献+

域间授权互操作研究综述 被引量:9

A Survey of Research on Inter-Domain Authorization Interoperation
在线阅读 下载PDF
导出
摘要 分布式系统安全是多域协作场景下的重要研究领域,近年来得到大力发展.在大多数实际的多域协作过程中,无论开发者还是管理者都不想完全摈弃已有的权限管理和访问控制体系,希望在授权开放性和系统改造代价间保持平衡和兼顾.域间授权互操作正是在这一背景下逐渐成为该领域具有代表性的研究方法.着力对域间互操作理论和技术的整体进展与演化进行细致梳理与剖析,从多维视角下对其进行归类比较,例如:根据域间协作架构划分,可分为松耦合协作模式和联邦式协作模式;根据安全检测实施方式划分,可分为基于协调中心的检测模式和无协调中心模式;根据互操作建模方式划分,主要包括基于管理行为的预前建立模式和基于请求驱动的实时建立模式;根据建立互操作采用的辅助技术划分,主要涉及基于信任、基于风险和基于语义等;根据策略整合所处的层面划分,可分为面向授权管理的策略集成和面向资源聚合的策略集成.针对若干典型方案,阐述其基本原理、适用场景,对技术特点和局限性给出较为深入的对比分析,在大量现有研究工作的基础上综述授权互操作发展的基本特点,归结展望了今后可能的研究趋势. Distributed system security is an important research field for the scene of multi-domain cooperation that has been developed abundantly in recent years.During most practical cooperating processes,both developers and administrators won't abandon the legacy systems of entitlement management and access control completely,but expect to hold the balance between authorization opening and rebuilding costs.Just in such background,authorization interoperation becomes a representative research method.From multidimensional perspectives,this paper focuses on carding and dissecting the progress and evolution of the theory and technology of interoperation.For example:from the perspective of inter-domain cooperative architecture,the interopertion can be divided into loosely-coupled pattern and federated pattern;from the perspective of security detection mechanism,it can be divided into mediator-based scenario and mediator-free scenario;from the perspective of modeling approach,it can be divided into arbitrary management advance modeling and request-driven real time modeling;from the perspective of assistive technology,it relates to trust-based,risk-based and semantic based assistance,etc;and from the perspective of policy integration level,it can be separated into authorization management oriented integration and resource aggregation oriented integration.For every typical scheme,the survey elaborates the basic theory and applicable scene,and analyzes technical features and limitation through comparison.Finally,a conclusion is drawn which includes some mainstream characteristics of this area,and then summarizes and forecasts future potential research trends.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第10期1673-1689,共17页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60803129 61003228) 中国科学院知识创新工程重要方向项目(YYYJ-1013) 下一代互联网业务试商用及设备产业化专项(CNGI-09-03-03)~~
关键词 信息安全 授权管理 访问控制 域间授权互操作 策略整合 information security authorization management access control inter-domain authorization interoperation policy integration
  • 相关文献

参考文献59

  • 1Miyata T,Koga Y,Madsen P,et al.A survey on identity management protocols and standards[J].IEICE-Trans on Information and Systems,2006,E89-D(1):112-123.
  • 2Ates M,Gravier C,Lardon J,et al.Interoperability between heterogeneous federation architectures:Illustration with SAML and WS-Federation[C]//Proc of the 3rd Int IEEE Conf on Signal-Image Technologies and Internet-Based System.Washington:IEEE Computer Society,2007:1063-1070.
  • 3Maliki T E,Seigneur J-M.A survey of user-centric identity management technologies[C]//Proc of the Int Conf on Emerging Security Information,Systems,and Technologies.Washington:IEEE Computer Society,2007:12-17.
  • 4Zhang L H,Ahn G-J,Chu B-T.A rule-based framework for role based delegation[C]//Proc of the 6th ACM Symp on Access Control Models and Technologies.New York:ACM,2001:153-162.
  • 5Barka E,Sandhu R.Framework for role-based delegation models[C]//Proc of the 16th Annual Computer Security Applications Conf.Washington:IEEE Computer Society,2000:168-176.
  • 6Zhang X W,Oh S,Sandhu R.PBDM:A flexible delegation model in RBAC[C]//Proc of the 8th ACM Symp on Access Control Models and Technologies.New York:ACM,2003:149-157.
  • 7Abdul-Rahman A,Hailes S.A distributed trust model[C]//Proc of the 1997 Workshop on New Security Paradigms.New York:ACM,1998:48-60.
  • 8Design of a role-based trust-management framework[C]//Proc of the 2002 IEEE Symp on Security and Privacy.Washington:IEEE Computer Society,2002:114-130.
  • 9Sabater J,Sierra C.Review on computational trust and reputation models[J].Artificial Intelligence Review,2005,24(1):33-60.
  • 10Bertino E,Ferrari E,Squicciarini A.Trust negotiations:Concepts,systems,and languages[J].Computing in Science and Engineering,2004,6(4):27-34.

二级参考文献33

共引文献54

同被引文献73

引证文献9

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部