期刊文献+

基于PKI/PMI和T-RBAC的网格工作流安全模型

Grid Workflow Security Model Based on PKI/PMI and T-RBAC
下载PDF
导出
摘要 研究网格工作流的安全问题,结合网格和工作流的特点,给出一种基于PKI/PMI和T-RBAC的网格工作流安全模型。该模型采用PKI/PMI技术进行身份认证和角色授权,利用基于角色和任务相结合的访问控制方式(T-RBAC)机制对工作流程动态管理,达到更加安全和灵活的目的。最后给出一个实例,并对该模型的安全性进行分析。 Just like the problem of network security, the problem of security in grid has been focused. Safety and efficiency can be acquired at the same time after the problem solved that taking work_flow task under the dynamic gird environment securely. Combining the characteristics of grid and workflow, gird workflow security model based on PKIfPMI and T-RBAC was presented. PKI/PMI was brought into identity authentication and role authorization. Workflow tasks were run dynamically by using T-RBAC. More safe and flexible purpose was achieved. At the last an example was given to analyze the security of this model.
出处 《电力科学与工程》 2008年第4期24-27,37,共5页 Electric Power Science and Engineering
关键词 网格工作流 PKI/PMI T-RBAC 安全访问控制 grid workflow PKIfPMI T-RBAC security access control
  • 相关文献

参考文献18

二级参考文献122

  • 1应宏.网格技术及其应用[J].计算机工程与设计,2004,25(10):1685-1688. 被引量:21
  • 2丁静波,罗静,童维勤.网格环境下的集群系统作业管理研究[J].计算机工程与设计,2004,25(11):1900-1902. 被引量:7
  • 3WfMC. TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper[S]. http://www. wfmc.org, 1998.
  • 4Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
  • 5Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
  • 6Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
  • 7Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
  • 8都志挥 陈渝 刘鹏.网格计算[M].北京:清华大学出版社,2002..
  • 9Foster I,Kesselman C,Tsudik G,Tuecke S. A Security Architecture for Computational Grids [A]. In: Proc. 5th ACM Conf. on Computer and Communications Security Conf. [C]. USA: ACM Press, 1998. 83~92
  • 10Foster I,Kesselman C,Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Organizations [J]. International Journal of High Performance Computing Applications, 2001,15 (3): 200 ~222

共引文献333

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部