期刊文献+

协同环境中共有资源的细粒度协作访问控制策略(英文) 被引量:9

A Fine-Grained Coalition Access Control Policy for Jointly-Owned Resources in Collaborative Environments
下载PDF
导出
摘要 在军事和商业领域中,由多个自治域形成的协作群体对共有资源(如客体、应用程序以及服务等)的访问问题越来越受到重视.协作中的基本事实是:尽管这些自治域有共同的目标,但同时有不同的自身利益.为了有效地保护共有资源,把“信任”的概念引入了协作访问控制中,并在基于量化权限的思想上,提出了细粒度的协作访问控制策略.在该策略里,权限的使用形式是元权限,也就是单位权限,它是访问共有客体权限的一个划分,可为多个域中不同用户所拥有.当访问共有资源时,参与者们所拥有的元权限的值之和以及人数必须达到规定的权限门限值和人数值,并且访问时间是所有参与者的共同许可访问时间段,这使得可以对协作资源进行有效地分布控制.另外,还引入了元权限的使用时间段约束.最后,证明了该细粒度协作访问控制策略关于协作系统的状态转换是保持安全的. Joint access to shared resources (e.g., objects, applications, and services) among autonomous domains that form a coalition has recently become important in both military and commercial areas. The brass tacks in coalition are that these domains have different self-interests although they focus on achieving a common goal. In this paper, to enable effective protection of jointly-owned resources, the notion of trust into coalition access control is built, and a fine-grained access control policy based on quantifying permission idea is proposed. The usage format of permission in this policy is meta-permission that is a share of access permission to coalition resources and is owned by multiple domain users. When accessing jointly owned resources, the sum of participants’ meta-permission value must attain a predefined permission quantity called “permission-threshold” and an assigned participant member number. In addition, permissible time span of the meta-permission is also taken into account to achieve the above goals and access requesting time must fall into their common permissible time span. Doing this enables the coalition to retain control over the access to coalition resources in distributed environments. Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.
出处 《软件学报》 EI CSCD 北大核心 2005年第5期1000-1011,共12页 Journal of Software
基金 国家自然科学基金 国家重点基础研究发展规划(973) 国家杰出青年科学基金 国家高技术研究发展计划(863)~~
关键词 协作 信任 元权限 元权限使用时间段 coalition trust meta-permission permissible time span of meta-permission
  • 相关文献

参考文献12

  • 1Khurana H, Gligor V, Linn J. Reasoning about joint administration of access policies for coalition resources. In: Proc. of the Int'l Conf. for Distributed Computer Systems. Austria (Vienna): IEEE Computer Society, 2002. 429-440.
  • 2Khurana H. Negotiation and Management of Coalition Resources [Ph.D Thesis]. University of Maryland, 2002.
  • 3Chopra K, Wallace WA. Trust in electronic environments. In: Proc. of the HCISS-36. Hawaii: IEEE Computer Society, 2003.
  • 4Shands D, Yee R, Jacobs J, Sebes EJ. Secure virtual enclaves: Supporting coalition use of distributed application technologies. In:Proc. of the Network and Distributed Systems Security Symposium. San Diego: Internet Society, 2000. 187-202.
  • 5Gibson T. An architecture for flexible multi-security domain networks. In: Proc. of the Network and Distributed Systems Security Symposium. San Diego: Internet Society, 2001.
  • 6Thompson M, Johnston W, Mudumbai S, Hoo G, Jackson K, Essiari A. Certificate-Based access control for widely distributed resources. In: Proc. of the 8th USENIX Security Symposium Washington: USENIX Association, 1999.
  • 7黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:73
  • 8Boneh D, Franklin M. Efficient generation of shared RSA keys. Advances in Cryptology-Crypto'97. LNCS 1233, Springer-Verlag,1997.425-439.
  • 9Malkin M, Wu T, Boneh D. Experimenting with shared generation of RSA keys. In: Proc. of the Internet Society's Symp. on Network and Distributed System Security. San Diego: Internet Society, 1999. 43-56.
  • 10Wu T, Malkin M, Boneh D. Building intrusion tolerant applications. In: Proc. of the 8th USENIX Securty Symp. Washington:USENIX Association, 1999. 79-91.

二级参考文献7

  • 1Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 2Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 3AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 4Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 5Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.
  • 6董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527[EB/OL].http://www.jos.org.cn/1000-9825/13/1521.pdf.,.
  • 7董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527.http://www.jos.org.cn/1000-9825/13/ 1521.pdf.,.

共引文献72

同被引文献99

引证文献9

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部