期刊文献+

P2P网络动态精细粒度访问控制研究 被引量:4

Research on dynamic fine grained access control in P2P networks
下载PDF
导出
摘要 分析了现有P2P系统中访问控制的不足,结合RBAC(角色访问控制)和TBAC(基于任务访问控制),加入环境约束条件,提出了一种精细粒度的动态访问控制模型——ETRBAC。该模型对角色、权限、子任务进行层次划分,角色分为本地角色和协作角色,由子任务选择必要的角色和权限并进行合理配置。多个子任务协作构成一个会话。最后详细描述了ETRBAC模型的结构及实施流程。对比分析表明,本模型可以很好地应用到动态协作环境中。 This paper discussed the disadvantages of access control mechanism of current P2P systems. Proposed a new dynam- ic and fine-grained access control model named ETRBAC, which was based on RBAC and TBAC, and some environmental con- straints were also added into the model. In this model, made roles, permissions, and subtasks hierarchical. Roles were divided into two kinds named local roles and collaborative roles. It was the subtask' s duty to select needed roles and permissions and arrange them in pairs. A session may include many subtasks. At last, described the structure of ETRBAC in detail, and the impletnenting flow as well. Through comparison analysis with other access controls models, can conclude that the model adapts to dynamic collaborative environment efficiently.
出处 《计算机应用研究》 CSCD 北大核心 2009年第4期1467-1470,共4页 Application Research of Computers
基金 国家“863”计划资助项目(2006AA01Z455) 山东省自然科学基金资助项目(2004ZX17,2004ZX14) 聊城大学青年基金资助项目(X061015)
关键词 对等网络 访问控制 任务 角色 动态 精细粒度 peer-to-peer access control task role dynamic fine-granularity
  • 相关文献

参考文献8

  • 1ZHANG Qian,SUN Yu,LIU Zheng,et al. Design of distributed P2P- based grid content management architecture[ C]//Proc of the 3rd Annual Communication Networks and Services Research Conference. 2005:339-344.
  • 2牛新征,佘堃,路纲,周明天.基于RBAC技术的P2P安全机制的研究[J].电子科技大学学报,2007,36(3):493-495. 被引量:3
  • 3窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 4BERKET K, ESSIARI A, THOMPSON M R. Securing resources in collaborative environments a peer-to-peer approach [ C ]//Proe of the 17th lASTED International Conference on Parallel and Distributed Computing and Systems. Phoenix : [ s. n. ] ,2005 : 14-16.
  • 5沈海波,洪帆.基于企业环境的访问控制模型[J].计算机工程,2005,31(14):144-146. 被引量:17
  • 6STAMP M, MATHUR A, KIM S. Role based access control and the Jxta peer-to-peer framework [ C ]// Proc of International Conference on Security & Management. 2006.
  • 7SANDHU R S, COYNE E J, FEINSTEIN H L,et al. Role-based access control models[ J]. IEEE Computer,1996,29(2) :38-47.
  • 8THOMAS R K, SANDHU R. Task-based authentication controls (TABC) :a family of models for active and enterprise-oriented authentication management [ C ]//Proc of the 11 th IFIP WG11.3 Workshop on Database Security. Lake Tahoe, Califomia, London: Chapman Hall, 1997 : 166-181.

二级参考文献13

共引文献340

同被引文献37

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2沈海波,洪帆.基于企业环境的访问控制模型[J].计算机工程,2005,31(14):144-146. 被引量:17
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Sandhu R S, Coyne E J, Feinstein H L, et al. Role--based Access Control Models[J]. IEEE Computer, 1996,29(2) :38-47.
  • 5Li Jun-qing, Li Xin-you, Xie Sheng-xian,et al. Multi-Hierarchy and Fine-Grained Task-role-based Access Control in Collaborative Environments[C]. IEEM ,2008,1 591-1 595.
  • 6Li Jun-qing, Li Xin-you, Xie Sheng-xian, et al. A fine-grained time-constraint role-based access control using OCL[C]. ICDIM,2008,81-86.
  • 7Thomas R K,Sandhu R. Task-based authentication controls(TABC) :a family of models for active and enterprise-orien-ted authentication management[C]. //Proc of the 11th IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, London: Chapman Hall, 1997,166-181.
  • 8Priebe T, Dobmeier W, Kamprath N. Supporting Attributed--based Access Control with Ontologies[C] Proc. of the First International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, 2006:465-472.
  • 9Jaehong Park, Ravi S Sandhu. The UCONABC usage control model [J]. Journal Title: ACM Transactions on Information and System Security (TISSEC). 2004, 7(1) :128-174.
  • 10Zhang X W, Oh S, Sandhu R S. PBDM: A flexible delegation model in RBAC. In: Ferrari E, Ferraiolo D, eds. Proe. of the 8th ACM Symp[M]. on Access Control Models and Technologies. New York: ACM Press, 2003,149- 157.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部