期刊文献+

基于SAML和PMI的授权管理模型 被引量:3

Authorization management model based on SAML and PMI
下载PDF
导出
摘要 针对跨应用系统交互过程中存在的安全认证问题,提出了一种基于安全断言标记语言(SAML)和授权管理基础设施(PMI)的授权管理模型。该模型运用逻辑分离和应用结合的方法实现用户权限管理和授权访问。在PMI的基础上运用SAML断言、SAML协议和SAML绑定技术实现身份验证、属性获取和授权决策,通过属性权威机构(AA)和目录服务器(LDAP)实现对证书的管理。实验结果表明,该模型能有效实现对多角色用户的跨应用系统安全访问控制。 During message exchange in across-application there is risk of security certificate. An authorization management model based on Security Assertion Markup Language (SAML) and Privilege Management Infrastructure (PMI) is presented in this paper. The model implements authority management and grants access through combination of logic separation and application. It uses SAML assertion, SAML protocol and SAML binding technologies to conduct identification, attribute acquisition and grant decision based on PMI. This model attains the ability of certificate management by the Attribute Authority (AA) and the Light weight Directory Access Protocol (LDAP). Experiment results demonstrate that the model is competent for across-application security access control of multi-role users.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2009年第5期1321-1325,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60776807) '863'国家高技术研究发展计划项目(2006AA12A106)
关键词 计算机应用 授权管理 身份验证 安全断言标记语言 授权管理基础设施 computer application authorization management identification security assertion markup language(SAML) privilege management infrastructure(PMI)
  • 相关文献

参考文献8

  • 1Hartman Bret,Flinn Donald J.全面掌握Web服务安全性[M].杨硕,译.北京:清华大学出版社,2004.
  • 2Deitel Harvey M.JavaWeb服务高级教程[M].邱仲潘,陈纯颖,陈凌峰,译.北京:机械工业出版社,2003.
  • 3钟迅科.基于SAML实现Web服务的单点登录[J].现代计算机,2004,10(4):32-36. 被引量:9
  • 4Thomas Grob. Security analysis of the SAML single sign on browser/artifact profile [R]. IBM Zurich Research Laboratory Zurich, Switzerland, 2002.
  • 5胡九庆,张力,戴红权.基于SAML单点登录安全服务体系的应用研究[J].微计算机信息,2006(12X):31-33. 被引量:7
  • 6Chadwick David W. An X. 509 role-based privilege management infrastructure[J]. Future Generation Computer Systems, 2003, 19(2):277-289.
  • 7罗昌行,欧阳晋,章卫国.基于SAML标准的信任与授权服务平台设计[J].计算机工程,2005,31(13):118-120. 被引量:12
  • 8Sankar Krishna. Distributed services security using the SAML[C] // Key Presentation, Sixth Workshop On Distributed Objects and Components, MA, USA, 2002.

二级参考文献14

  • 1史创明,王立新.数字签名及PKI技术原理与应用[J].微计算机信息,2005,21(06X):122-124. 被引量:32
  • 2Perlman R.An Overview of PKI Trust Models[J].Network,1999,13(6):38—43.
  • 3Levi A,Caglayan M U.An Efficient,Dynamic and Trust Preserving Public Key Infrastructure[A].IEEE Proc.on Security and Privacy[C],Berkeley,2000:203—204.
  • 4Jorgen Thelin.Identity,Security,and XML Web Services.O'ReiUy Emerging Technology Conference,2003.
  • 5Eve Maler.Assertions and Protocol for the OASIS Security Assertion Markup language(SAML)v1.1.http://www.oasis-open.org/committees/documents.php?wg_abbrev=security,2003.
  • 6Prateek Mishra.Bindings and Profiles for the OASIS Security AssertionMarkupLanguage(SAML)v1.1.http://www.oasls—open.org/committees/documents.php?wg_abbrev-security,2003.
  • 7Rob Philpott.Security and Privacy Considerations for the OASIS Security Assertion Markup Language(SAML)v1.1.http://www.oasis-open.org/committees/documents.pap? wg_abbrev=security,2003.
  • 8Scott Cantor.SAML Version 2.0 Scope and Work Items.http://www.oasis-open.org/committees/documents.php?wg_ab- brev=security,2003.
  • 9Harold F.Tipton,Micki Krause.信息安全管理手册(卷Ⅲ)[M].张文,邓芳玲,程向莉,吴娟,译.电子工业出版社,2004:1-35
  • 10Thomas.Security analysis of the SAML single sign-on browser/artifact profile[J].Computer Security Applications Conference.2003:298-307

共引文献24

同被引文献24

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部