期刊文献+

网格环境下基于协商的跨域访问控制模型

Negotiation-based in Cross-domain Acces Grid Environments
原文传递
导出
摘要 在网格环境下,如何解决跨管理域的访问控制问题是实现资源共享和协同工作的关键。文中在基于角色的访问控制机制下,提出了一种基于协商的跨域访问控制模型并对其进行了形式化描述。各个域通过共同协商来定义、分配虚拟角色,用户以虚拟角色来实现虚拟组织内的跨域访问。此外,模型以访问控制策略的形式引入了计算对上下文信息的约束,从而能够支持上下文敏感的访问控制。 In grid environments, how to solve cross-domain access control is the key to sharing resources and working coordinately. This paper proposes a negotiation-based cross-domain access control model, and then gives the description of its formalization. In this model, all member domains define and assign virtual roles by negotiating together, the users initiate a cross-domain access in virtual roles. In addition, constraints on access context information are introduced as access control strategies, thus to support context-sensitive access control.
作者 张红旗
出处 《信息安全与通信保密》 2009年第8期130-133,共4页 Information Security and Communications Privacy
基金 国家863基金资助项目(2006AA012457).
关键词 网格计算 协商 跨域 访问控制 grid computing negotiation cross domain access control
  • 相关文献

参考文献12

  • 1陈捷,祝世雄.网格安全分析及安全措施[J].信息安全与通信保密,2007,29(6):18-21. 被引量:2
  • 2Pearlman L, Welch V, Foster Authorization Service et al. A Community Collaboration[C]// Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
  • 3Niinimaki M, Organizations and Databas International White J, de Cerff W, et al Membership System with EDG' e Access[C]//Proeeedings Workshop on Database and Applications, 2004 Using s Grid Security of the 15th Expert Systems.
  • 4Thompson M, Johnston W, Mudumbai S, et al. Certificate-based Access Control for Widely Distributed Resources[C]// Proceedings of the Eighth Usenix Security Symposium, 1999.
  • 5Chadwick D, Otenko h. The Permis X. 509 Role Based Privilege Management Infrastructure[C]// Proceedings of SACMAT 2002 Conference, [s. l.]: ACM Press, 2002:135-140.
  • 6Barton T, Basney J, Freeman T, et al. Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy[C]// In 5th Annual PKI R&D Workshop, April 2006.
  • 7Welch V, Barton T, Keahey K, et al. Siebenlis. Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration[C]// In 4th Annual PKI R&D Workshop, April 2005.
  • 8Khurana H, Gligor Administration of V, Linn Access J. Reasoning about Joint Policies for Resources[C]// Proceedings of the International Conference on Distributed Computing Systems, July 2002.
  • 9Bharadwaj V G, Baras J S. Towards Automated Negotiation of Access Control Policies[C]//Proceedings of the Fourth International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), June 2003.
  • 10Bharadwaj V G, Baras J S. A Framework for Automated Negotiation of Access Control Policies[C]// Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX Ⅲ), 2003.

二级参考文献8

  • 1武小年,肖侬.数据网格系统GridDaen安全机制的设计与实现[J].计算机工程与科学,2006,28(2):14-15. 被引量:1
  • 2陈颖,杨寿保,郭磊涛,申凯.网格环境下的一种动态跨域访问控制策略[J].计算机研究与发展,2006,43(11):1863-1869. 被引量:21
  • 3[1]Jennifer M Schopf.Grids:The Top Ten Questions,Mathematics and Computer Science Division,Argonne National Lab,Department of Cornputer Science,Northwestern University,Bill Nitzberg,Veridian,PBS Products.
  • 4[2]Ian Foster,What is the Grid?A Three Point Checklist.Argonne National Laboratory & University of Chicago.
  • 5[3]张黎,刘鹏,王立华.走向军事网格.解放军出版社,2004.11.
  • 6[4]Gary Buda,Booz Allen & Hamilton,Linthicum,Don Choi.Security Standards for the Global Information Grid,Defense Information Systems Agency,Reston,Richard F.Graveman,Telcordia Technologies,Morristown,Chris Kubic,Department of Defense,Ft.Meade.
  • 7[5]Shanshan Song,Kai Hwang,Mikin Macwan,Fuzzy Trust Integration for Security Enforcement in Grid Computing,Internet and Grid Computing Laboratory,University of Southern California,Los Angeles,CA.90089 USA.
  • 8[6]Security Challenges in Supporting Grid Computing and COUaboration.Mary R Thompson,Keith R Jackson,Distributed Systems Department-LBNL.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部