期刊文献+

基于Web服务的分布式协同环境中DRBAC访问控制 被引量:1

Access-Control Strategy of RBAC in the Distributed Coordinate Circumstance Based on Web Service
下载PDF
导出
摘要 分布式协同环境在一些部门、企业中的应用越来越广泛,Web服务为多个自治域间的协同工作提供了通用平台,而基于Web服务对安全,尤其是Web服务的授权访问控制提出了特殊的要求。通过对RBAC(Role Base Access Control)模型的改进,有效的增强了基于Web服务的分布式协同环境下的RBAC访问控制安全性,提高了系统的访问效率。 The application of distributed coordinate circumstance is becoming more and more popular in some departments and corporations. Web service provides common platform for coordinate work between Autonomous Systems, it requests special requirements for safety problems, especially for authorized access-control. RBAC (Role Base Access Control) is mentioneaned and improved which model improves system efficiency and ensures the security.
出处 《科学技术与工程》 2007年第12期2885-2888,2893,共5页 Science Technology and Engineering
关键词 WEB服务 RBAC 分布式协同环境 Web service RBAC distributed coordinate circumstance
  • 相关文献

参考文献9

  • 1[1]W3C,Simple Object Access Protocol (SOAP) 1.1,Available at URL:www.w3.org/TR/SOAP/,May 2000
  • 2[2]W3C,Web Services Architecture,Available at URL:http://www.w3.org/TR/2003/WD-ws-arch-20030808/
  • 3[3]W3C,Web Services Description Language (WSDL) 1.1,Available at URL:www.w3c.org/TR/wsdl,March 2001
  • 4[4]Ferraiolo D,Kuhn R.Role-based access controls.In:Proceedings of the 15th NIST-NCSC National Computer Security Conference.Baltimore,MD,1992:554-563
  • 5[5]Ferraiolo D,Barkley J,Kuhn R.A role-based access control model and reference implementation within a corporate intranet.ACM Transaction on Information and System Security,1999 ;2 (1):34-64
  • 6许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56
  • 7[7]Mutual K R.Exelusion of ralas as a means of inplementing separation of duty in role based acess control system.Proceeding of the znd ACM Workshop on nole-based Aeess Gontral.Fairfax,Virgiria,Vnited States:ACM Press,1997:23-30
  • 8[8]Saltzer J H,Schroeder M D.The Protection of information in computer systems.Proceedings of the IEEE,1975,63 (9):1278-1308
  • 9[9]Wood C,Fernandez E B.Authorization in a decentralized database system.In:Proceedings of the 5th International Conference on Very Large Databases.1979,352-357

二级参考文献11

  • 1Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 2Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972
  • 3Xu Feng, Xie Jun, Huang Hao, Xie Li. Context-aware role-based access control model for Web services. Lecture Notes in Computer Science 3252, 2004, 430~436
  • 4Ferraiolo David, Kuhn Richard. Role-based access controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, 1992, 554~563
  • 5Sandhu R., Conyne E.J., Lfeinstein H.L. et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 6Ferraiolo D.F., Sandhu R., Guirila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001, 4(3): 224~274
  • 7Xu Feng, Lin Guo-Yuan, Huang Hao, Xie Li. Role-based access control system for Web services. In: Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), Wuhan, 2004, 357~362
  • 8Thomas R.K., Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, London, 1997, 166~181
  • 9Sudhir Agarwal, Barbara Sprick. Access control for semantic Web services. In: Proceedings of IEEE International Conference on Web Services (ICWS'04), San Diego, California,USA, 2004, 770~773
  • 10Bhatti R., Joshi J.B.D., Bertino E., Ghafoor A. Access control in dynamic XML-based Web-services with XRBAC. In: Proceedings of the 1st International Conference on Web Services, Las Vegas, 2003, 243~249

共引文献55

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部