期刊文献+

网格环境下的可信认证与访问控制技术

Certification and access control based on creditability in grid
下载PDF
导出
摘要 传统的访问控制由身份、授权决定,用户一旦取得一定的资格和权利,在范围内的活动就不再考察其行为的表现,直到另一次授权的改变。在网格环境中无论其身份如何,只要其行为是不安全的,就必须制止其不安全的操作。因此必须要加强对行为的监测、记录和控制。只有在现有身份认证的基础上,结合基于行为信任的行为认证与访问控制,不断地考察实体的行为并对其表现进行评价和记录,由其历史表现来决定对其的行为控制,才能真正做到网格环境下的安全交易。 Conventional access control is based on the identity and authorization. If the user has qualification to do something, his behavior is not warded in spite of what he will do until his qualification is canceled. But if the action is hazard, it has to be forbidden without regarding its identity. So, the inspecting, recording and controlling of action must be done. Besides conventional identity certification, certification and access control base on behavior creditability control the actions of entities by its action creditability. The action creditability is obtained by inspecting, scoring and recording the behaviors of entity. Only doing this, the grid security is realized.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第6期1306-1308,共3页 Computer Engineering and Design
关键词 行为控制 网格安全 行为可信性 可信认证 访问控制 behavior control grid security behavior creditability certification based on creditability access control
  • 相关文献

参考文献7

  • 1Azzedin F,Maheswaran M.Evolving and managing trust in grid computing systems[C].Canadian Conference on Electrical and Computer Engineering,IEEE CCECE,2002.1424-1429.
  • 2Abdul-Ranman A,Hailes S.Supporting trust in virtual communities[C].Maui,Hawaii:Proceedings Hawaii International Conference on System Sciences 33,2000.
  • 3Sarmenta L,Hirano S,Bayanihan.Building and studying volunteer computing systems using Java[J].Future Generation Computer Systems,1999,(15):675 -686.
  • 4Li Xiong,Ling Liu.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transations on knowledge and data engineering,2004,16(7):843-856.
  • 5林满山,郭荷清,尹剑飞,高学勤.基于信任度的网络应用对等单点登录[J].华南理工大学学报(自然科学版),2004,32(10):56-61. 被引量:9
  • 6Sen S,Sajja N.Robustness of reputation-based trust:Boolean case[C].Bologna,Italy:Copyright ACM,Proceedings of First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS),2002.288-293.
  • 7FerraioloDF,BarkleyJF,KuhnDA.A role based access control model and reference implementation within a corporate intranet[J].ACM Transactions on Information Systems Security,1999,(2):109-122.

二级参考文献12

  • 1[1]Microsoft..net passport review guide [EB/OL].http://www.microsoft.com/net/services/passport/review_guide.asp,2003-03-13.
  • 2[2]Liberty Alliance Project.Liberty architecture overview [EB/OL].http://www.projectliberty.org/specs/liberty-architecture-overview-v1.1.pdf,2003-01-15.
  • 3[3]Chinitz J.Single sign-on:Is it really possible? [J].Information Systems Security,2000,9(3):112-116.
  • 4[4]Parker T A.Single sign-on systems-the technologies and the products [A].Proceeding of European Convention on Security and Detection [C].Brighton UK:IEEE,1995.151-155.
  • 5[5]Volchkov A.Revisiting single sign-on-a pragmatic approach in a new context [J].IT Professional,2001,3(1):39-45.
  • 6[6]Altman J E.PKI security for JXTA overlay networks [EB/OL].http://www.jxta.org/docs/pki-security-for-jxta.pdf,2003-02-01.
  • 7[7]Laginski R.Peer to peer role based authentication within JXTA [EB/OL].http://www.scs.carleton.ca/~arpwhite/documents/honoursProjects/ryan-laginski-2003.pdf,2003-04-11.
  • 8[8]Shafer G.Perspective on the theory and practice of belief functions [J].Int Journal of Approximate Reasoning,1990,4(1):323-362.
  • 9[9]Zadeh L A.Review of books:A mathematical theory of evidence [J].The AI Magazine,1984,1(1): 81-83.
  • 10[10]Yager R R.On the dempster-shafer framework and new combination rules [J].Information Sciences,1987,41(2):93-137.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部