期刊文献+

网格环境中基于GSI的改进授权模型的设计

Design of improved authorization model based on GSI in grid environment
在线阅读 下载PDF
导出
摘要 网格计算作为一种新的分布式计算模型,具有分布式、异构和动态变化等特性,若要在网格中实现资源共享的目的,资源的访问控制是首当其冲需要解决的问题。网格的访问控制是建立在现有的基于角色访问控制系统之上的,但是由于网格跨越多个不同的地点和不同的自治域,每个域的访问控制策略和需求可能相差甚远,这使得资源的访问控制更加复杂,如用户-角色的指派和映射。文章在现有的GSI改进授权模型中,用属性对角色进行了扩展,可实现更灵活、动态和细粒度的访问控制。 As a new distributed computing model,grid computing has the features of distributed,heterogeneous and dynamic change.If we want to realize resource sharing in the net,access control of resources is the most important problem.The resource sharing is established on the basic of the role-based access control system,but due to the different spots and different autonomous area,the access control policy is far away from the demand,it makes access control of resources more complicated,such as user-role assignment and mapping difficulty.In the GSI improved authorization model,attributes,extending from roles,can make up those shortcomings of RBAC,and also make access control more flexible,dynamic and fine-grained.
作者 王蓝婧
出处 《企业技术开发》 2010年第8期1-3,共3页 Technological Development of Enterprise
基金 华北电力大学青年教师科研基金资助(200911018)
关键词 网格计算 授权 GSI 角色 属性 grid computing authorization GSI role attribute
  • 相关文献

参考文献4

二级参考文献10

  • 1Ravi Sandhu, Edward J Coyne, Hal L Feinstein,et al. RoleBased Access Control Models[J]. IEEE Computer, 1996 ,29(2): 38-47.
  • 2Deborah Shands, Richard Yee, Jay Jacobs, et al. Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies[J]. ACM Trans on Information and System Security, 2001, 4(2): 103-133.
  • 3David F Ferraiolo, Ravi Sandhu, Serban Gavrila, et al. Proposed NIST Standard for Role-Based Access Control [J].ACM Trans on Information and System Security, 2001, 4(3): 224-274.
  • 4M Blaze, J Feigenbaum, J Ioannidis, et al. The KeyNote Trust-Management. Version 2[R]. RFC 2704, 1999.
  • 5C Ellison, B Frantz, B Lampson, et al. SPKI Certificate Theory[R]. RFC 2693, 1999.
  • 6L Ninghui, W H Winsborough, J C Mitchell. Distributed Credential Chain Discovery in Trust Management (Extended Abstract) [A]. Proc 8th ACM Computer and Communication Security (CCS01)[C]. 2001. 156-165.
  • 7E Freudenthal,T Pesin, L Port, et al. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments[R]. Technical Report TR2001-819, New York University, 2001.
  • 8L Ninghui. Delegation Logic: A Logic-Based Approach to Distributed Authorization[J]. ACM Trans on Information and System Security, 2003, 6 (1): 128-171.
  • 9D D Clark, D R Wilson. A Comparison of Commercial and Military Computer Security Policies[A]. Proc of 1987 IEEE Symp on Security and Privacy[C]. 1987. 184-194.
  • 10D F Ferraiolo,R S Sandhu,S Gavrila, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Trans on Information and System Security, 2001,4(3): 224-274.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部