期刊文献+

P2P环境下基于信任度的可控委托信任管理模型 被引量:2

Controllable delegation trust management model based on trustworthiness in P2P
下载PDF
导出
摘要 结合基于角色的访问控制和信任管理各自的优势,提出一个适用于开放式环境的基于信任度的可控委托授权模型,实现对角色中包含的本地和继承权限的委托控制。提出了为本地策略中的角色分配信任度阈值的方法,为角色授权增加信任度的考虑,给出在这种扩展后的信任管理系统中计算实体信任度的算法,并结合具体实例对模型的使用进行了说明。 A controllable delegation authorization model that is suitable for open environments was presented. It integrated the merits of both Role Based Access Control (RBAC) and role-based trust management and can effectively control the propagation of permissions of different inheritance hierarchy in roles. An approach for assigning trustworthiness thresholds to permissions in local access control policy was discussed. The algorithm of calculating the values of trustworthiness of entities in the extended framework was proposed. The usage of the model was illustrated through a typical example.
作者 高迎 战疆
出处 《计算机应用》 CSCD 北大核心 2009年第9期2332-2335,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60703007)
关键词 授权 信任度 委托深度 访问控制 角色 authorization trustworthiness delegation depth access control role
  • 相关文献

参考文献9

  • 1SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
  • 2ANSI INCITS. Role based access control [ S]. ANSI INCITS 359- 2004, American National Standard for Information Technology, 2004.
  • 3FERRAIOLO D F, CUGINI J, KUHN D R. Role-based access control (RBAC) : Features and motivations [ C]//Proceedings of the 11th Annual Computer Security Application Conference. New Orleans: IEEE Computer Society, 1995:241-248.
  • 4JOSHI J B D, BERTINO E, LATIF U, et al. A generalized temporal role based access control model [ J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(1) : 4 -23.
  • 5LI N H, WINSBOROUGH W H, MITCHELL J C. Distributed credential chain discovery in trust management [ C]// Proceedings of the 8th ACM Conference on Computer and Communications Security. New York: ACM Press, 2001: 156-165.
  • 6翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34
  • 7廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 8王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 9高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20

二级参考文献61

  • 1Li NH,Winsborough WH,Mitchell JC.Distributed credential chain discovery in trust management.Journal of Computer Security,2003,11(1):35-86.
  • 2Li NH,Mitchell JC.RT:A role-based trust-management framework.In:Proc.of the 3rd DARPA Information Survivability Conf.and Exposition.Washington,IEEE Computer Society Press,2003.201-212.http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
  • 3Clarke D,Elien JE,Ellison C,Fredette M,Morcos A,Rivest R.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322.
  • 4Aura T.Fast access control decisions from delegation certificate databases.In:Proc.of the 3rd Australasian Conf.on Information Security and Privacy (ACISP '98).Brisbane:Springer-Verlag,1998.284-295.http://research.microsoft.com/users/tuomaura/Publications/aura-acisp98.pdf
  • 5Ellison C,Frantz B,Lampson B,Rivest R,Thomas B,Ylonen T.SPKI certificate theory.Internet RFC 2693,1999.
  • 6Jim T.SD3:A trust management system with certificate evaluation.In:Proc.of the 2001 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2001.106-115.
  • 7Li NH,Mitchell UC,Winsborough WH.Design of a role-based trust-management framework.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2002.114-130.http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
  • 8Ajmani S,Clarke DE,Moh CH,Richman S.ConChord:Cooperative SDSI certificate storage and name resolution.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002).Cambridge:Springer-Verlag,2002.141-154.http://pmg.csail.mit.edu/~ajmani/papers/lncs2429.pdf
  • 9Ellison C.SPKI Requirements.Internet RFC 2692,1999.
  • 10Hildrum K,Kubatowicz JD,Rao S,Zhao BY.Distributed object location in a dynamic network.In:Proc.of the 14th ACM Symp.on Parallel Algorithms and Architectures.Winnipeg:ACM Press,2002.41-52.http://oceanstore.cs.berkeley.edu/publications/papers/pdf/SPAA02.pdf

共引文献89

同被引文献14

  • 1SANDHU R,COYNE E,FEINSTEIN H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 2BARKA E,SANDHU R.Framework for role-based delegation models[C] // Proceedings of the 16th Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2000:168-176.
  • 3BARKA E,SANDHU R.Role-based delegation model/hierarchical roles (RBDM1)[C] // Proceedings of the 20th Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2004:396-404.
  • 4ZHANG L H,AHN G J,CHU B T.A rule-based framework for role-based delegation[C] // Proceedings of the 6th ACM Symposium on Access Control Models and Technologies.New York:ACM,2001:153-162.
  • 5ZHANG X W,OH S,SANDHU R.PBDM:A flexible delegation model in RBAC[C] // Proceedings of the 8th ACM Symposium on Access Control Models and Technologies.New York:ACM,2003:149-157.
  • 6AHN G J,SANDHU R.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security,2000,3(4):207-226.
  • 7Barka E,Sandhu R.Framework for role-based delegation models[C] //Proceedings of the 16th Annual Computer Security Applications Confer-ence.Washington,DC:IEEE Computer Society,2000:168-176.
  • 8Alsulaiman F A,Miege A,Saddik A E.Threshold-based collaborative access control(T-CAC)[C] //Proceedings of CTS 2007 Symposium on Col-laborative Technologies and Systems.Orlando:IEEE Press,2007:46-56.
  • 9Barka E,Sandhu R.Role-based delegation model/hierarchical roles(RBDM1)[C] //Proceedings of the 20th Annual Computer Security Applica-tions Conference.Washington.DC:IEEE Computer Society,2004:396-404.
  • 10Li N H,Bizri Z,Tripunitara M V.On mutually-exclusive roles and separation of duty[C] //Proceedings of the 11th ACM Conference on Computerand Communication Security.New York:ACM Press,2004:42-51.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部