期刊文献+

A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
下载PDF
导出
摘要 PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Tenth Five-rear Planfor Scientific and Technological Development of China (413160501) the National Natural Science Foundation of China (50477038)
关键词 access control RBAC(role-based access controd TRUST CACHE PMI (privilege management infrastructure) access control RBAC(role-based access controd trust cache PMI (privilege management infrastructure)
  • 相关文献

参考文献10

  • 1张书钦,芦东昕,杨永田.对等网络中基于信任的访问控制研究[J].计算机科学,2005,32(5):31-33. 被引量:15
  • 2顾雷,何川,黄震春,杜彬,李三立.基于服务网关的虚拟服务缓存的研究和应用[J].计算机学报,2005,28(4):534-540. 被引量:5
  • 3The Directory: Authentication Framework. ISO/IEC9594-8 . 1998
  • 4The Globus Toolkit 4 Programmer’’s Tutoria [ DB/OL]. http:// www.casa-sotomayor .net/gt4-tuto- rial/ . 2005
  • 5Rizzo L,Visisano L.Replacement Policies for a Proxy Cache[].IEEE ACM Transactions on Networking.2000
  • 6Yu,S.-p. Research on theory and application of role-based access control . 2003
  • 7Shaomin,Zhang,Baoyi,Wang,Lihua,Zhou.Constructing Secure web Services Based on XML[].Lecture Notes in Computer Science.2003
  • 8Shaomin,Zhang,Baoyi,Wang. Managing Access in Extended Enterprise Networks Web Service-Based . 2004
  • 9DilleyJ,ArlittM.Improvingproxycacheperformance:analysisofthreereplacementpolicies[].IEEEInternetComputing.1999
  • 10F. Ferraiolo,R. Sandhu,S. Gavrila,R. Kuhnand,R. Chandramouli.Proposed NIST Standarde for Role-Based AccessControl[].Transactionson Ivnformation and System Security Volume Number August.2001

二级参考文献18

  • 1Marsh S. Formalising Trust as a Computational Concept:[Ph. D. Thesis]. University of Stirling, 1994
  • 2Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System. In: Proc. of the Tenth Intl. Conf. on Information and Knowledge Management (ACM CIKM'01), 2001. 310~317
  • 3Xiong L, Liu L. A Reputation-Based Trust Model for Peer-to-Peer Ecommerce communities. In:IEEE Conference on E-Com-merce (CEC'03) 2003
  • 4Seigneur J-M, Jensen C. The Role of Identity in Computational Trust. In: Proc. of The First Workshop on Security and Privacy at the Conf. on Pervasive Computing, Vienna, Austria, April 2004
  • 5English C, Terzis S, Wagealla W. Engineering Trust Based Collaborations in a Global Computing Environment. In: Proc. of the Second Intl. Conf. on Trust Management (iTrust 2004), LNCS,Springer-Verlag, 2004
  • 6Gray E, O'Connell P, Jensen C, et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications: [Technical Report TCD-CS-2002-66]. Department of Computer Science, Trinity College Dublin, December 2002
  • 7Park J S,Hwang J. Role-Based Access Control for Collaborative Enterprise in Peer-to-Peer Computing Environment. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June 2-3, 2003
  • 8Fenkam P, Dustdar S, Kirda E, et al. Towards an access control system for mobile peer-to-peer collaborative environments. In:IEEE 11th Intl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), Carnegie Mellon University, Pittsburgh, Pennsylvania, USA. IEEE Computer Society Press, June 2002
  • 9Foster I., Kesselman C., Tuecke S. The anatomy of the grid: Enable scalable virtual organizations. International Journal of Supercomputer Applications, 2001, 15(3): 200~222
  • 10Devaram K., Andresen D. SOAP optimization via parameterized client-side caching. In: Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), PDCS 2003, Marina Del Rey, CA, 2003, 785~790

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部