期刊文献+

基于委托的分布式动态授权策略 被引量:2

Dynamic authorization scheme based on delegation in distributed system
下载PDF
导出
摘要 针对分布式协作环境中的授权问题,基于委托模型和RBAC模型,提出一种基于委托的分布式动态授权策略。通过扩展RBAC模型的元素集和静态授权操作,并由委托者动态创建临时委托角色和委托授权,支持"部分角色转授权"。系统授权采用三级层次结构实现,并给出了动态委托授权过程。系统实现及应用表明了其能够适应分布协作环境下的分布动态授权需求,遵循"最小特权"原则。 Concerning the authority in distributed environment for collaboration, a dynamic authorization scheme was presented based on delegation and RBAC model. The scheme supports partial role delegation, by expanding element sets of RBAC model, enlarging static authorization operations, and allowing the delegator to create temporary delegation roles and assign others (the delegatee) to the particular roles. The scheme was implemented by three-level frameworks, and the operating process about how to authorize dynamically in delegation model was described. The application shows that the scheme can adapt to distributed and dynamic environment, and follow the least privilege principle.
出处 《计算机应用》 CSCD 北大核心 2008年第6期1365-1368,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60773118) 国家863计划项目(2006AA01A109) 现代通信国家重点实验室基金资助项目(9140C1101050706)
关键词 访问控制 委托授权 角色访问控制 公钥基础设施 特权管理基础设施 access control delegation Role-Based Access Control (RBAC) Public Key Infrastructure (PKI) Privilege Management Infrastructure (PMI)
  • 相关文献

参考文献7

  • 1CHADWICK D W. The X. 509 privilege management infrastructure [C/OL]// Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking. Bled, Slovenia, 2003 [2007 - 10 -03]. http://www. cs. kent. ac. uk/pubs/ 2004/2278/content. pdf.
  • 2FERRAIOLO D F , SANDHU R , GAVRILA S , et al. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2001, 4(3): 224 -274.
  • 3BARKA E, SANDHU R. A role-based delegation model and some extensions [C/OL]// Proceedings of the 23rd National Information Systems Security Conference ( NISSC 2000). Baltimore, 2000 [ 2007-10-05]. http://www. list. gmu. edu/confmc/nissc/rbdm00.pdf.
  • 4BARKA E, SANDHU R. Role-based delegation model/hierarchical roles (RBDM1) [C]// Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04). Washington: IEEE Press, 2004:396-404.
  • 5ZHANG X W, OH S, SANDHU R S. PBDM: A flexible delegation model in RBAC [ C]// Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2003:149 - 157.
  • 6TUECKE S, WELCH V, ENGERT D, et al. RFC 3820, Internet X. 509 Public Key Infrastructure (PKI) proxy certificate profile [ S/ OL]. (2004-06) [ 2007 - 10 -25]. http://www.left. org/rfc/ rfc3820. txt.
  • 7Von LASZEWSKI G, FOSTER I, GAWOR J, et al. A Java commodity grid kit [J]. Concurrency and Computation: Practice and Experience, 2001, 13(8/9) : 643 -662.

同被引文献18

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2张黎明,王小明,李黎.几种基于角色的代理授权模型特征比较[J].微机发展,2004,14(11):126-129. 被引量:3
  • 3廖旭,张力.工作流管理系统中一种基于任务的委托模式[J].计算机工程与应用,2005,41(7):44-46. 被引量:5
  • 4洪帆,段素娟,黎成兵.基于图的委托授权模型[J].北京邮电大学学报,2005,28(6):5-7. 被引量:7
  • 5SANDHU R,COYNE E,FEINSTEIN H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 6BARKA E,SANDHU R.Framework for role-based delegation models[C] // Proceedings of the 16th Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2000:168-176.
  • 7BARKA E,SANDHU R.Role-based delegation model/hierarchical roles (RBDM1)[C] // Proceedings of the 20th Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2004:396-404.
  • 8ZHANG L H,AHN G J,CHU B T.A rule-based framework for role-based delegation[C] // Proceedings of the 6th ACM Symposium on Access Control Models and Technologies.New York:ACM,2001:153-162.
  • 9ZHANG X W,OH S,SANDHU R.PBDM:A flexible delegation model in RBAC[C] // Proceedings of the 8th ACM Symposium on Access Control Models and Technologies.New York:ACM,2003:149-157.
  • 10AHN G J,SANDHU R.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security,2000,3(4):207-226.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部