期刊文献+

一种分布式环境下陌生实体访问控制模型

AN ACCESS CONTROL MODEL BETWEEN STRANGE ENTITIES IN THE DISTRIBUTED ENVIRONMENTS
下载PDF
导出
摘要 利用安全Cook ie和加密技术对带证据的认证模型PCA(Proof-carrying Authorization)进行了改进,提高了模型的安全性和实用性,并首次将模型应用到分布式环境下陌生实体之间的访问控制。通过对参与访问控制实体的属性和网络环境属性的认证,实现了分布式访问控制系统中陌生实体之间信任的建立,解决了系统中访问控制安全策略有局限性、交互性差的问题。该模型适用于P2P网络和网格等大型分布式网络环境。 Current access control in open systems mostly occurs between strange entities. On the basis of the study of the PCA system,an improved access control model is constructed by the encryption technique and the secure Cookie technique. The new model is applied to the access control between strange entities in distributed environment. Through the authorization of the attributes of the entities and the network environment, the trust relationship between strange entities in distributed access control system is established. The shortage in security strategy limitation and interaction is solved. The new access control model can be applied in large-scale distributed environments, such as P2P and grid environment. The implementation of the new model is also illustrated.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第3期94-96,110,共4页 Computer Applications and Software
基金 计算机网络与信息安全教育部重点实验室开放课课题资助(20040103)
关键词 PCA 陌生实体 访问控制 RSA 安全Cookie PCA Strange entities Access control RSA Secure Cookie
  • 相关文献

参考文献5

  • 1Bauer L, Schneider M A, Felten E W. A General and Flexible AccessControl System for the Web [ C ]. In : Proceedings of the 11 th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
  • 2Ljudevit Bauer. Access Control for the Web via Proof-carrying Authorization [ D ]. Princeton University. Nov. 2003.
  • 3薛贵荣,沈洁.基于Cookies的分布式多Web系统的认证[J].计算机工程与应用,2002,38(18):151-153. 被引量:5
  • 4马亚娜,钱焕延,孙亚民.用Cookie构建Web安全的实现[J].计算机工程,2002,28(11):34-35. 被引量:22
  • 5Ross J Anderson.信息安全工程[M].北京:机械工业出版社,2003.

二级参考文献6

  • 1Whitfield Diffie.应用密码学[M].机械工业出版社,2000..
  • 2Kristol D, Montulli L. RFC2109:HTTP State Management Mechanism. 1997-02
  • 3Franks J, Baker P H, Hostetler J, et al. RFC2617: HTTP Authentication: Basic and Digest Access Authentication. Network Working Group,1999-06
  • 4Fu K, Sit E, Smith K, et al. Dos and Don'ts of Client Authentication on the Web, MIT Technical Report 818, 2001-08
  • 5Menezes A, Oorschot P V,Vanstone S. Handbook of Applied Cryptography. CRC Press, Inc., 1997
  • 6Gutzmann K. Access Control and Session Management in the HTTP Environment IEEE Internet Computing, 2001-01

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部