期刊文献+

基于PKI/PMI和SOA访问控制方案的设计

Access control systems based on SOA and PKI/PMI
下载PDF
导出
摘要 构建安全、高效和公平的企业系统资源的统一访问控制系统,是目前一个重要的研究方向。分析了面向服务的架构技术(SOA)、面向角色的访问控制(RBAC)技术、公钥基础设施PKI和权限管理基础设施PMI在安全管理方面的作用,并重点分析了欧共体PERMIS工程的优缺点,在此基础上把SOA和PKI/PMI很好的结合起来构建了访问控制子系统,克服了PERMIS工程的不足,实现了企业系统的安全、高效的访问控制功能,为企业系统的访问控制提供了一种参考方案。 It is an important research direction to build a safe, efficient and fair access control system for business system resources. This paper analyses the use of the service - oriented architecture (SOA) technology, role based on the access control (RBAC) technology, public key infrastructure PKI and privilege management infrastructure PMI in safety management , and analyses the advantages and disadvantages of the EC PERMIS . Then it builds access control subsystem in the base of integrating the SOA and PKI / PMI. It overcomes the deficiencies of the PER- MIS project, and has got the secure and efficient access control of enterprise system , which provides a reference scheme for the enterprise access control system.
作者 林川
出处 《贵州教育学院学报》 2009年第3期34-37,共4页 Journal of Guizhou Educational College(Social Science Edition)
关键词 SOA PKI/PMI 访问控制 安全性 SOA PKI/PMI access control security
  • 相关文献

参考文献7

  • 1Rafae Bhatti,Elisa Bertino,Arif Ghafoor.An Integrated Approach to Federated Identity and Privilege Management in Open Systems[J].Communications of the ACM,2007,50(2):81-87.
  • 2B.Blobd,P.Hoepner,R.Joop,S.Karnouskos,G.Kleinhuis,G.Stassinopoulos.Using a privilege management infrastructure for secure web-based e-health applications[J].Computer Communications 2003,26:1863-1872.
  • 3F.L.Gutierrez Vela,J.L.Isla Montes,P.Paderewski Rodr?guez,M.Sanchez Roman,B.Jimenez Valverde.An architecture for access control management in collaborative enterprise systems based on organization models[J].Science of Computer Programming.2007,66:44-59.
  • 4李涛,徐建良,王晓燕.基于PMI的工作流管理系统安全模型[J].微计算机信息,2008,24(9):57-59. 被引量:3
  • 5陈飞,傅德胜.基于PKI的电子商务交易系统及交易中信息安全的实现[J].微计算机信息,2004,20(5):115-117. 被引量:8
  • 6David W.Chadwick,Alexander Otenko.The PERMIS X.509 role based privilege management infrastructure[J].Future Generation Computer systems,2003,19:277-289.
  • 7Mark Endrei,Jenny Ang,Ali Arsanjani,Sook Chua,Philippe Comte,Pal Krogdahl,Min Luo,Tony Newling.Patterns:Service-oriented Architecture and Web Services(Redbcok)[M].IBM TSO,2004.

二级参考文献8

  • 1张燕燕.一个可行的基于角色的PMI授权管理方案[J].信息安全与通信保密,2005(2):179-182. 被引量:3
  • 2[1]WFMC-TC-0021019.Workflow Management Coalition Work-flow Security Considerations White Paper.http://www.wfmc.org.
  • 3[2]John A.Miller,Mei Fan,Amit,P.Sheth and Kry J.Kochut.ACM Trans.on Information and System Security.Security in Web-based Workflow Management Systems.2002.
  • 4[3]Kandala S,Sandhu R.Secure Role-based Workflow Models[J].In Proceedings of the 15th IFIP WGl1.3 Working Conference on Database Security,Kluwer,2002:45-58.
  • 5[5]R K Thomas,R Sandhu.Task-based authorization controls (TBAC),A family of models for active and enterprise-oriented au-thorization managenent.In:T Y Lin.S Qian eds.Database Security XI:Status and Prospects.CA:Chapman & Hall,1997,166-181.
  • 6.Windows2000公共密钥基础架构[EB/OL].http:∥www.microsoft.co,.
  • 7邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 8付松龄,谭庆平.基于任务和角色的分布式工作流安全模型[J].国防科技大学学报,2004,26(3):57-62. 被引量:24

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部