期刊文献+

基于角色的网格授权策略的一致集成服务 被引量:3

Consistent Integration Service for Role-Based Grid Authorization Policies
下载PDF
导出
摘要 提出一种动态捕获和集成本地变更的授权策略的服务框架,保障共享资源持续可用。并给出一组调解算法,可把对VO授权系统调整的影响降低到最小。 A service that can dynamically capture and consistently integrate changed local policies is proposed to keep resources available. And a series of algorithms is presented to minimize the impact on VO authorization system.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第10期12-15,19,共5页 Microelectronics & Computer
基金 自然科学基金重大研究计划(90412010) 国家"863"高技术研究发展计划项目(2006AA12Z202)
关键词 虚拟组织 授权策略 一致集成 virtual organizations authorization policies consistent integration
  • 相关文献

参考文献6

  • 1Morris Sloman,Jorge Lobo,Emil Lupu.Security and management yolky specificationp[J].IEEE Network,2002,16(2):10-19
  • 2Wu Jin.Policy-based access control framework for grid computing[J].IEEE International Symposium on Cluster Computing and the Grid,2006(1):391-394
  • 3Humphrey M,Thompson M,Jackson K R.Security for grids[J].Proceedings of the IEEE (Special Issue on Grid Computing),2005,93(3):644-653
  • 4Ian Foster,Carl Kesselman,Laura Pearlman,et al.The community authorization service:status and future[C].In:Proceedings of Computing in High Energy Physics,La Jolla,California,USA,2003
  • 5Alferi R,Cecchini R,Ciaschini V,et al.From gridmapfile to VOMS:managing authorization in a grid environment[J].Future Generation Computer System Joumal,2005,21(4):549-558
  • 6Jin Wu.Policy-based access control framework for grid computing[C].Sixth IEEE International Symposium on Chster Computing and the Grid,2006:1391-394

同被引文献13

  • 1夏志雄,张曙光.RBAC在基于Web管理信息系统中的应用[J].计算机应用研究,2004,21(7):198-199. 被引量:20
  • 2佟强,周园春,吴开超,阎保平.基于过滤器的Web访问模式挖掘[J].计算机工程,2007,33(6):59-61. 被引量:2
  • 3李生,王东安,徐浩,南凯,阎保平.科学数据网格环境中访问控制系统的研究与设计[J].微电子学与计算机,2007,24(7):8-12. 被引量:6
  • 4David F Ferraiolo, Richard Kuhn D. Ramaswamy chandramouli, role - based access control[M]. 2nd ed. Norwood:Artech House Inc. , 2007.
  • 5冀汶莉.基于RBAC模型的权限管理系统的研究与应用[J].微电子学与计算机,2007,24(8):86-88. 被引量:20
  • 6Hyung Chan Kim, Wook Shin, R S Rarnakrishna, et al. A policy language for the extended reference monitor in trusted operating systerns[C]//Proc, of the Second International Conference on Availability. Vienna: Reliability and Security, 2007:1160- 1166.
  • 7Christian D Jensen, Kristine Frank. Informatics and mathematical modeling-cryptOS[ EB/OL]. [2007- 01- 19]. http://www2. imm. dtu. dk/cdj/CryptOS/index. html.
  • 8Crampton J. A reference monitor for workflow systems with constrained task execution [ C ]//Proceedings of the tenth ACM symposium on access control models and technologies. Stockholm, Sweden:ACM Press, 2005-38 - 47.
  • 9刘克龙,冯登国,石文昌.安全操作系统研究的发展[M]//安全操作系统原理与技术.北京:科学出版社,2004:58-75.
  • 10Jing Wang, Yoshiaki Takata, Hiroyuki Seki. HBAC: a model for history-based access control and its model checking[C]//11th European Symposium On Research In Computer Security (ESORICS 2006). Hamburg, Germany: Lecture Notes in Computer Seienee 4189, 2006:263 - 278.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部