期刊文献+

主动节点资源访问控制策略

Access Control Policy for Active Node Resources
下载PDF
导出
摘要 主动网络的灵活性使主动网络面临更加严峻的资源安全问题,尤其是主动节点方面.分析了主动节点资源访问的研究现状和存在的问题,设计了一种主动节点资源访问控制机制.提出利用权能对资源访问控制策略进行描述,动态维护.对用户的管理采用基于角色的方法.在主动信包中封装用户角色信息,主动节点解析出用户角色后,依据它在策略库中匹配相应的描述控制访问权限策略的方法,即权能.通过权能实现对节点资源的访问. The mobile of active networks raise considerable safety and security problems,especially in active node. This paper analyses the access control research actuality and problems for active node resources,and designs the safety and security architecture of access control for active node resources. This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic. The method for access control based on the roles is adopted in user management. After decoding the user role encapsuled in active packet, we can obtain the method describing policy of access control in policy store, called capability. Access control for active node can be completed by capability.
出处 《西安工业学院学报》 2006年第1期36-40,共5页 Journal of Xi'an Institute of Technology
基金 陕西省教育厅项目(02JK147)
关键词 主动网络 主动节点 权能 策略 角色 active networks active node capability policy role
  • 相关文献

参考文献10

二级参考文献36

  • 1ESIB-ENST Working Group. Internals Of The Active Network Simulator. July 23, 2002.
  • 2Active Network Working Group. Security Architecture for active nets. May 30, 2001.
  • 3Sandra Murphy. Secure Active Network Prototypes. March16,1999.
  • 4JessGarms DanielSomerfield.Java 安全性编程指南[M].北京:电子工业出社,2002,1..
  • 5[1]Tennenhouse D L,Smith J M,Sincokie W D,et al.A survey of active network research [J].IEEE Comm Mag, 1997,35(1):80~85.
  • 6[2]Active Networks Working Group. Architectural fram-ework for active networks (Version 1.0)[EB/OL].http://www.cc.gatech.edu/projects/canes/arch/arch-1-0.ps,1999-07-27/2000-02-15.
  • 7[3]Fry M,Ghosh A.Application level active networking[J].Computer Network,1999,31(7):655~667.
  • 8[4]Konstantions P.Active network:application,security,safety and architecture [EB/OL].http://www.comsoc.org/pubs/surveys,1998-04-16/2001-10-12.
  • 9[5]Ken C,Roy C,Carl G,et al.Security architecture for active networks [EB/OL].http://www.ittc.ukans.edu/~ansecure/0079.html,2000-05-19/2000-12-10.
  • 10[6]Schwartz B,Jackson A W,Strayer W T,et al.Smart Packets:applying active networks to network management [J].ACM Transactions on Computer Systems,2000,18(1):67~88.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部