期刊文献+

P2P中基于信任和属性的访问控制 被引量:4

Trust-Attribute-based Access Control in P2P Environments
在线阅读 下载PDF
导出
摘要 P2P具有无集中控制节点、节点对等自治和网络动态的特点,这些特点为实施访问控制带来很大的挑战,传统的访问控制技术不能很好地适应对等网环境。首先对现有的对等网环境中的访问控制技术进行研究,然后在基于信任模型的角色访问控制的基础上,针对无法区分通过信任模型计算出相同结果的用户的问题,提出了基于信任和属性的访问控制。基于信任和属性的访问控制引入资源属性和用户属性来分别描述资源和用户,依据用户属性、信任模型计算出的数值、环境属性和授权策略来建立用户角色指派关系,依据资源属性和授权策略来建立角色权限指派关系,从而解决基于信任模型的角色访问控制存在的问题。 Traditional access control models which are based on identity are not adaptive in P2P environments,which characterize non-centralization,autonomy and dynamic characteristic.We analyzed the access control issue in P2P envi-ronments.The existing trust-based role access control lacks measures to distinguish users whose results from a trust model are same.We proposed trust-attribute-based access control to deal with this problem.Trust-attribute-based ac-cess control describes users and resources using user attributes and resource attributes.The model builds user role as-signment using user attributes,the result from a trust model,environment attributes and authorization policy and builds role permission assignment using resource attributes and authorization policy.
机构地区 国防科技大学C
出处 《计算机科学》 CSCD 北大核心 2011年第2期28-31,41,共5页 Computer Science
基金 国家自然科学基金(60903225 70971134)资助。
关键词 访问控制 属性 P2P Access control Attribute P2P
  • 相关文献

参考文献12

  • 1宋伟,卢正鼎,李瑞轩,於光灿,柯锋.一种Peer-to-Peer环境下的分布式访问控制模型[J].计算机应用与软件,2006,23(12):31-33. 被引量:4
  • 2Maruoka M,Nemati A G,Barolli V,et al.Role-based Access Control in Peer-to-Peer(P2P) Societies[C] ∥22nd International Conference on Advanced Information Networking and Applications.IEEE Computer Society,2008:495-500.
  • 3Fenkam P,Dustdar S,Kirda E.Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments[C] ∥Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprise.IEEE Computer Society,2002:95-102.
  • 4Palomar E,Estevez-Tapiador J M,Hernandez-Castro J C,et al.Certificate-based Access Control in Pure P2P Networks[C] ∥Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing.IEEE Computer Society,2006:177-184.
  • 5Berket K,Essiari A,Muratas A.PKI-based Security for Peer-to-Peer Information Sharing[C] ∥Proceedings of the Fourth International Conference on Peer-to-Peer Compu-ting.IEEE Computer Society,2004:45-52.
  • 6张书钦,芦东昕,杨永田.对等网络中基于信任的访问控制研究[J].计算机科学,2005,32(5):31-33. 被引量:15
  • 7张骞,张霞,刘积仁.混合P2P环境下有效的访问控制机制[J].东北大学学报(自然科学版),2007,28(5):643-647. 被引量:2
  • 8Wang Lei,Zhu Yanqin,Jin Lanfang,et al.Trust Mechanism in Distributed Access Control Model of P2P Networks[C] ∥Se-venth IEEE/ACIS International Conference on Compu-ter and Information Science.IEEE Computer Society,2008:19-24.
  • 9Tran H,Hitchens M,Varadharajan V,et al.A Trust based Access Control Framework for P2P File-Sharing Systems[C] ∥Proceedings of the 38th Hawaii International Conference on System Sciences.IEEE Computer Society,2005:302c-302c.
  • 10Gummadi A,Yoon J P.Modeling Group Trust For Peer-to-Peer Access Control[C] ∥Proceedings of the 15th International Workshop on Database and Expert Systems Applications.IEEE Computer Society,2004:971-978.

二级参考文献28

  • 1雷浩,冯登国,周永彬,黄建.基于量化权限的门限访问控制方案[J].软件学报,2004,15(11):1680-1688. 被引量:11
  • 2张书钦,芦东昕,杨永田.对等网络中基于信任的访问控制研究[J].计算机科学,2005,32(5):31-33. 被引量:15
  • 3张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 4Marsh S. Formalising Trust as a Computational Concept:[Ph. D. Thesis]. University of Stirling, 1994
  • 5Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System. In: Proc. of the Tenth Intl. Conf. on Information and Knowledge Management (ACM CIKM'01), 2001. 310~317
  • 6Xiong L, Liu L. A Reputation-Based Trust Model for Peer-to-Peer Ecommerce communities. In:IEEE Conference on E-Com-merce (CEC'03) 2003
  • 7Seigneur J-M, Jensen C. The Role of Identity in Computational Trust. In: Proc. of The First Workshop on Security and Privacy at the Conf. on Pervasive Computing, Vienna, Austria, April 2004
  • 8English C, Terzis S, Wagealla W. Engineering Trust Based Collaborations in a Global Computing Environment. In: Proc. of the Second Intl. Conf. on Trust Management (iTrust 2004), LNCS,Springer-Verlag, 2004
  • 9Gray E, O'Connell P, Jensen C, et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications: [Technical Report TCD-CS-2002-66]. Department of Computer Science, Trinity College Dublin, December 2002
  • 10Park J S,Hwang J. Role-Based Access Control for Collaborative Enterprise in Peer-to-Peer Computing Environment. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June 2-3, 2003

共引文献18

同被引文献48

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部