期刊文献+

基于使用控制和上下文的动态网格访问控制模型研究 被引量:10

Dynamic Context_aware Usage Control-based Grid Access Control Model
下载PDF
导出
摘要 网格环境动态、多域和异构性的特点决定其需要灵活、易于扩展和精细的授权机制。近来在网格环境下的访问控制方面做了大量研究,现有的模型大多在相对静止的前提下,基于主体的标识、组和角色信息进行授权,缺乏具体的上下文信息和灵活的安全策略。本文提出了网络环境下基于使用控制和上下文的动态访问控制模型。在该模型中,授权组件使用主体和客体属性定义传统的静态授权;条件组件使用有关的动态上下文信息体现了对主体在具体环境中的动态权限控制。在该模型的基础上,本文实现了一个原型系统,以验证模型的效率和易于实现性。 Due to inherent heterogeneity, multi domains characteristic and highly dynamic nature, grid environment requires scalable, flexible, and fine-gained access control mechanism. Despite the recent advances in access control for grid application do address important aspects of the overall authorization, these efforts focus on the pre-defined access control policies where authorization depends on identity or role of the subject. However, they are lacks of flexible approaches to adapt the dynamically security request. This paper proposes a dynamic context_aware usage control based grid access control model. In this model, authorization component evaluates access requests based on subject attrib- utes, object attributes and requests. While condition component dynamic grants and adapts permission to the subject based on a set of contextual information collected from the user and system environments. As a proof-of-concept we design and implement a prototype system based on our proposed architecture and conduct experimental studies to demonstrate the feasibility and performance of our model.
出处 《计算机科学》 CSCD 北大核心 2008年第2期37-41,共5页 Computer Science
基金 国家自然科学基金(60403027) 湖北省自然科学基金(2005ABA243)资助
关键词 网格安全 访问控制 使用控制 上下文 Grid security, Access control, UCON, Context_aware
  • 相关文献

参考文献17

  • 1Foster I, Kesselman C,Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Organization. Int ' 1 Journal of Supercomputer Applications and High-performance Computing, 2001,15 (3). 200-222.
  • 2Foster I, Kesselman C, Nick J M,et al. Grid Services for Distributed System Integration. IEEE Computer, 2002,35 (6) : 37-46.
  • 3Sandhu R, Coyne E, Feinstein H,et al. Role-based access control models. IEEE Computer, February 1996,29(2).
  • 4Ferraiolo D F, Sandhu R, et al. Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security, 2001,4(3) :224-274.
  • 5Sandhu R, Park J. Usage control : A vision for next generation access control. In:Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security. 17-31.
  • 6Park J ,Sandhu R. Towards usage control models: beyond traditional access control. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, ACM Press. 57-64.
  • 7Park J, Sandhu R. The UCONABC Usage Control Model. ACM Transactions on Information and Systems Security, Feb. 2004, 7 (1) : 128-174.
  • 8Kesselman F C, Tsudik G, Tuecke S. A Security Architecture for Computational Grids. In:Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998. 83-92.
  • 9Pearlman L, Welch V, Foster I,et al. A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
  • 10Cannon S, Chan S, Olson D, et al. Using CAS to Manage Rolebased VO Sub-Groups. In: Proe. of Int'1 Conferenee for Computing in High Energy and Nuelear Physies, 2003.

同被引文献112

引证文献10

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部