期刊文献+

基于移动Agent的协同访问控制模型

A Cooperative Access Control Model Based on Mobile Agent
下载PDF
导出
摘要 针对目前一些访问控制系统防内不防外或防外不防内、各自为政、单点失效、网络通信负载过重等问题,在RBAC模型基础上提出了一种的基于移动Agent的协同访问控制模型。首先对RBAC进行了层次建模,然后根据移动Agent特性,构建了分级处理的协同访问控制构架。该模型通过群签名机制对合法用户签发授权票据,以此进行访问控制。实验表明,该模型具有良好的可伸缩性、健壮性和安全性,有效地促进了访问控制技术的发展。 This paper proposes a mobile agent _ based cooperative access control model on the basis of RBAC (Role-based Access Control) model in allusion to current problems in access control system such as inner defense, but no outer defense or outer defense but no inner defense, method doing things in his own way, invalidation for single point, overbalance in network communication load, etc. This paper first models RBAC to a hierarchical model, and then constructs a cooperative access control architecture of hierarchical processing by the characters of mobile agent. The model adopts group signature mechanism to sign and distribute granted tickets for valid users as credentials to access control. The experiments show the model has high flexibility, toughness and security. The model effectively promotes the progress of access control technology.
作者 罗东俊
出处 《上海应用技术学院学报(自然科学版)》 2006年第2期108-113,共6页 Journal of Shanghai Institute of Technology: Natural Science
关键词 访问控制 授权管理 移动AGENT RBAC access control permission management mobile agent RBAC
  • 相关文献

参考文献2

二级参考文献13

  • 1Yan Han,ACM SIGSOFT Software Engineering Notes,2000年,25卷,2期,64页
  • 2Dewan D,ACM Transactions Computer Human Interaction,1998年,5卷,1期,34页
  • 3Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 4Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972
  • 5Xu Feng, Xie Jun, Huang Hao, Xie Li. Context-aware role-based access control model for Web services. Lecture Notes in Computer Science 3252, 2004, 430~436
  • 6Ferraiolo David, Kuhn Richard. Role-based access controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, 1992, 554~563
  • 7Sandhu R., Conyne E.J., Lfeinstein H.L. et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 8Ferraiolo D.F., Sandhu R., Guirila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001, 4(3): 224~274
  • 9Xu Feng, Lin Guo-Yuan, Huang Hao, Xie Li. Role-based access control system for Web services. In: Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), Wuhan, 2004, 357~362
  • 10Thomas R.K., Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, London, 1997, 166~181

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部