期刊文献+

基于信任域的分布式安全访问控制的研究与实现 被引量:1

Research and Implementation of Distribute Secure Access Control Based on Trust Domain
下载PDF
导出
摘要 多域环境下的访问控制是域间互操作必须要解决的重要问题。针对数据交换平台项目中政府机构存在的地域和职能域不同的管理级别,构造了地域职能域融合确定信任域的方法,并通过制定基于角色的访问控制策略实现对跨域数据交换中心系统中域资源的不同权限安全访问。 Access control based on multi-domain environment is an important issue when inter-operate across the domains. The different manage-levels of the region and department in the government are focued on. A method to integrate region and department to define trust domain is presented, and security access control strategy based on RBAC is defined, to access different domains with different privilege.
出处 《科学技术与工程》 2006年第19期3135-3138,共4页 Science Technology and Engineering
关键词 RBAC 信任域 访问控制 角色 RBAC trust-domain access control role
  • 相关文献

参考文献4

  • 1章志明,张正球,余敏.一种基于RBAC的多个域之间安全访问控制[J].计算机工程,2005,31(15):135-136. 被引量:9
  • 2Shafiq B;Joshi J B D.Secure interoperation in a multi-domain environment employing RBAC policies,2005(11).
  • 3Ferraiolo DF;Sandhu R;Gavrila S.Proposed NIST standard for rolebased access control,2001(03).
  • 4Sandhu R;Coyne E J;Feinstein H L;Youman,C.E.Role-based access control models[J],1996(02).

二级参考文献4

  • 1Sandhu R S,Samarati P.Authentication,Access Control,and Intrusion Detection.In:ACM Computing Surveys,50th Anniversary Comme-morative Issue,1996,28(1)
  • 2Object Management Group.CSI:Common Secure Interoperability.Technical Report,1996
  • 3Object Management Group.CORBA 2.3.1/IIOP Specification.Techni-cal Reprot ,1999
  • 4刘琼波,施军,尤晋元.分布式环境下的访问控制[J].计算机研究与发展,2001,38(6):735-740. 被引量:18

共引文献8

同被引文献9

  • 1Blaze M, Feigenbaum J, Keromytis A D. KeyNote: Trust management for public-key infrastructures [C]//Proceedings of llth International Workshop on Security Protocols. Heidelberg, Berlin : Springer, 1998:625-630.
  • 2Winsborough W H, Li Ninghui. Safety in automated trust negotiation [J]. ACM Transactions on Information and System Security, 2006, 9(3) : 352-390.
  • 3McGibney J, Botvich D. A service-centric approach to access control and monitoring based on distributed trust[C]//IBM CAS Software and Systems Engineering Symposium. New York, USA: ACM,2007: 294-305.
  • 4Kim S Y, Smari W W, McQuay W K. Security and access control for a human-centric collaborative commerce system [J]. Collaborative Technologies and Systems, 2006, 14-17: 429-439.
  • 5Zhang Yu, Li Xianxian, Huai Jinpeng. Access control in peer-to-peer collaborative systems [C]// 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05). USA:IEEE, 2005:835-840.
  • 6Winslett M, Yu Ting, Seamons K E. Negotiating trust on the Web [J]. IEEE Internet Computing, 2002, 6(6) : 30-37.
  • 7Wang Yao, Vassileva J. Bayesian network-based trust model [C]// IEEE/WIC International Conference on Web Intelligence. USA:IEEE, 2003:372-378.
  • 8Au R, Looi M, Ashley P. Automated cross-organizational trust establishment on extranets [C]// IEEE Information Technology for Virtual Enterprises. USA : IEEE, 2001 : 3-11.
  • 9Golbeek J. Trust on the World Wide Web [M]. Hanover, MA : Now Publishers Inc, 2008 : 20-50.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部