期刊文献+

云计算的服务安全体系结构和询问控制模型(英文) 被引量:3

Service Security Architecture and Access Control Model for Cloud Computing
下载PDF
导出
摘要 Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion.
出处 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页 中国通信(英文版)
基金 supported by National Information Security Program under Grant No.2009A112
关键词 cloud computing service security security architecture access control AUTHORIZATION cloud computing service security security architecture access control authorization
  • 相关文献

参考文献4

二级参考文献34

  • 1[1]Sandhu R, Samarati P. Authentication, Access Control, and Audit. ACM Comput. Surv., 1996,28(1):241-243
  • 2[2]Thomas R K. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. ACM RBAC'97, 1997
  • 3[3]Sandhu R S,Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1996,29(2):38-.47
  • 4[4]Shackelford D E,Smith J B,Smith F D.The Architecture and Implemen tation of a Distributed Hypermedia Storage System. Proceedings of ACM Hypertext'93, 1993:1-13
  • 5[4]Morris Sloman, Emil Lupu, Imperial College. Security and Management Policy Specification. IEEE Network, 2002, 16(2)
  • 6[5]Adam N R, Atluri Vijayalakshmi, Bertino Elisa. A Content-based Authorization Model for Digital Libraries. IEEE Translation Knowledge and Data Engineering, 2002, 14(2)
  • 7Sugerman J, Venkitachalam G, Lim B. Virtualizing I/O devices on VMware workstations hosted virtual machine monitor[C]//Proceedings of USENIX Annual Technical Conference, 2001 : 1-14.
  • 8Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles, Lake George, NY, 2003,10.
  • 9Bellovin S.Virtual machines, virtual sectLrity[J]. Communications of the ACM, 2006, 49(10): 104.
  • 10Bell D, Padula L La.Secure computer system: Unified exposition and Multics interpretation[R]. The MITRE Corporation: MTR22997 Revision 1.1976.

共引文献11

同被引文献32

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部