期刊文献+

面向网络化制造的用户认证模型及访问控制研究 被引量:2

User authentication & access control in networked manufacturing systems
下载PDF
导出
摘要 针对应用服务提供商模式的网络化制造系统的特点,设计了面向多用户的认证模型,将不同应用系统的认证功能和账号管理功能加以集成,用单点登录方式实现系统对用户的认证,分别采用单一口令认证、一次性口令认证和Kerberos协议认证,对不同等级的用户进行身份验证。对基于角色的访问控制模型进行时间约束扩展,在传统的静态主体和客体保护之上加入时间约束,使之能够随着时间的变化进行动态的授权保护。对于多会话时间约束,提出了用层次分析法计算各会话权重,根据会话的加权因子进行时间分配的算法,为应用服务提供商用户访问应用程序提供了安全保障。 A multi-user authentication model for the networked manufacturing system based on Application Service Provider(ASP) mode was designed.Single sign-on technology was used in users' authentication in which different authentication and account management functions in various application systems were integrated.Different authentication methods including password authentication,one-time password authentication and Kerberos authentication were introduced to different users' level.A role-based access control model with time character was discussed in which time constraints were applied to the traditional access control model to enable dynamic authorization constrains.For time constraints affecting more than one session,Analytical Hierarchy Process(AHP) was used to calculate the weight of each session,according to which the time limit for each session was set.The above model guaranteed secure access to ASP applications for remote users.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2007年第11期2121-2125,共5页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(50475168) 上海市基础性研究重点资助项目(06JC14066)。~~
关键词 网络化制造 应用服务提供商 身份认证 访问控制 安全 networked manufacturing application service provider authentication access control security
  • 相关文献

参考文献8

  • 1PINE II B. Mass customization-the new frontier in business competition[M]. Boston, Mass., USA: Harvard Business Press, 1993.
  • 2CERA C, BRAUDE L, KIM T, et al. Hierarchical role-based viewing for multilevel information security in collaborative CAD[J]. Journal of Computing and Information Science in Engineering, 2006, 6(1):2-10.
  • 3刘婷婷,汪惠芬,张友良.支持授权的基于角色的访问控制模型及实现[J].计算机辅助设计与图形学学报,2004,16(4):414-419. 被引量:9
  • 4DURI S, GRUTESER M, LIU X, et al. Framework for security and privacy in automotive telematics[C]//Proceedings of the 2nd International Workshop on Mobile Commerce. New York, N.Y., USA: ACM, 2002:25-32.
  • 5刘敏,严隽薇,王坚.网格化制造模式中面向联盟协同的安全体系及技术[J].计算机集成制造系统,2006,12(3):458-464. 被引量:12
  • 6SCHULTZ E. Security views [J]. Computer & Security, 2003, 22(7) :559-569.
  • 7STEINER J, NEUMAN C, SCHILLER J. Keberos: an authentication service for an open network systems [C]//Proceedings of Winter USENIX Conference. Berkeley, Cal., USA : USENIX, 1998 : 191-202.
  • 8董光宇,卿斯汉,刘克龙.带时间特性的角色授权约束[J].软件学报,2002,13(8):1521-1527. 被引量:51

二级参考文献25

  • 1徐家臻,陈莘萌.基于IPSec与基于SSL的VPN的比较与分析[J].计算机工程与设计,2004,25(4):586-588. 被引量:90
  • 2钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 3[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 4[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 5[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 6[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 7[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 8FOSTER I,KESSELMAN C, NICK J, et al. The physiology of the grid: an open grid services architecture for distributed systems integration [EB/OL]. http://www.globus.org/research/papers/ogsa.pdf, 2002.
  • 9FOSTER I,KESSELMAN C, NICK J, et al. Grid services for distributed system integration[J]. IEEE Computer, 2002, 35(6):37-46.
  • 10GLOBUS. Overview of the grid security infrastructure[DB/OL]. http://www. globus.org/security/overview.html.2002-10-17.

共引文献69

同被引文献15

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部