期刊文献+

基于可信计算的CSCW系统访问控制 被引量:1

CSCW system access control based on trusted computing
下载PDF
导出
摘要 针对现有的CSCW系统不能有效地保障终端平台的可信性以及安全策略和上层应用实施的完整性等问题,提出了基于可信计算技术的CSCW访问控制架构和协作站点间的基于角色的委托授权策略,分别描述了安全策略与共享对象密钥的分发协议、角色委托协议及策略完整性实施协议等.应用实例表明:该框架基于完整的协作实体-平台-应用信任链的构建,提供了可信的协作实体身份与访问控制平台,依赖平台远程证明和策略分发实现了在本地站点上的完整性实施;同时角色委托提高了协同工作能力,也减轻了服务器端集中式策略执行的负担. The trustworthiness of terminal platforms was not ensured effectively and the integrity of security policies and upper application was not implemented in existing CSCW systems. Therefore, trusted computing-based access control architecture for CSCW and roles-based delegation policy between collaboration workstations were presented. The security policies and sharing object key dissemination protocol, role delegation one and policy integrity enforcement one were respectively described. An example shows that owing to constructing a general entity platform-application trust chain, the trusted cooperative entity identity and the access control platform were provided in the architecture, and the integrity of policies was implemented on the platform in a local workstation through platform remote attestation and policy distribution. Moreover, the capability of cooperative work was improved and the burden of the centralized policies that was executed on server side is lessened.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第1期59-62,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60633020) 国家自然科学基金资助项目(60573036) 河南科技大学青年研究基金资助项目(2005QN019)
关键词 计算机支持协同工作(CSCW) 访问控制 可信计算 策略实施 角色委托 computer supported cooperative work (CSCW) access control trusted computing policy enforcement role delegation
  • 相关文献

参考文献8

  • 1龚能,李玉顺,史美林.协作环境中的关键技术研究[J].计算机科学,2005,32(9):230-233. 被引量:10
  • 2Zhu Haibin. Some issues of role-based collaboration [C] // Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering. Montreal: Institute of Electrical and Electronics Engineers Inc, 2003 : 687-690.
  • 3Zhu Haibin. Conflict resolution with roles in a collaborative system[J]. International Journal of Intelligent Control and Systems, 2005, 10(1): 11-20.
  • 4李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55
  • 5张志勇,普杰信.异构分布式CSCW委托授权模型及其访问控制[J].计算机工程,2006,32(12):71-73. 被引量:5
  • 6肖道举,刘超,陈晓苏.基于角色的CSC W系统安全模型[J].华中科技大学学报(自然科学版),2004,32(5):56-58. 被引量:1
  • 7Smith S W. Trusted computing platforms: design and applications. Boston: Springer, 2005.
  • 8Sandhu R, Zhang Xinwen, Ranganatham Kumar, et al. Client-side access control enforcement using trusted computing and PEI models[J]. Journal of High Speed Network, 2006(15): 229-245.

二级参考文献24

  • 1Zahir T,IEEE Internet Computing,1997年,1卷,5期,24页
  • 2茅兵,中国科学.E,1997年,27卷,6期,542页
  • 3Shen Honghai,Proceedings of thACMCSCW’92 Conference on Computer Supported Cooperative Work,1994年,51页
  • 4www. groove. net
  • 5Neches R, Fikes R, Finin T, et al. Enabling Technology For Knowledge Sharing. AI Magazine, 1991,12(3)
  • 6Kuutti K. The concept of activity as a basic unit of analysis for CSCW research. In: Proc. of the Second European Conf. on CSCW, Amsterdam. Kluwer Academic Publisher, 1991. 249 ~264
  • 7Kuutti K. Information Systems, Cooperative Work and Active Subjects: The Activity-Theoretical Perspective: [Ph. D. Thesis]. Department of Information Processing Science, University og Ou lu, Oulu, August 1994
  • 8Bardram J. Collaboration, Coordination, and Computer Support: [PhD thesis]. Aarhus University, Aarhus, Denmark, 1998
  • 9.[EB/OL].http:∥protege. stanford. edu,.
  • 10Mills K L. Computer Supported Cooperative Work. Encyclopedia of Library and Information Science(2nd Edition). 2003. 666~677

共引文献63

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部