期刊文献+

一个基于情境的Web服务安全模型 被引量:1

A Context-based Security Model for Web Services
下载PDF
导出
摘要 提出了一个基于情境的Web服务安全模型,该模型通过定义高层次的策略规则,Agent能在不中止Web服务运行的情况下动态控制用户的访问.通过对用户及Web服务的情境信息的收集和管理,使得访问控制在决策时能够动态适应环境的变化. A context-based Web service security model is proposed in this paper. By defining the high-level policies, agents can control users' access dynamically without halting Web Services and is feasible to make access control adapt to dynamic changes in the environment through the collection and management of users and the context information of Web Services.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第10期89-92,共4页 Microelectronics & Computer
基金 江苏省自然科学基金项目(BK2007074)
关键词 WEB服务 安全 情境 AGENT Web services security context Agent
  • 相关文献

参考文献11

  • 1Sandhu R S, Coyne E J, Feinstein H L, et al. Role- based access control models, computer [ J ]. IEEE Press, 1996,29(2) : 38- 47.
  • 2Oh S, Park S. Task- role - based access control model, information systems [ J]. Elsevier Science Ltd, 2003, 28 (6) : 533- 562.
  • 3Kudo M. PBAC: provision- based access control model [J]. International Journal of Information Security, 2004,1 (2): 116- 130.
  • 4Serrano J M, Serrat J, Galis A. Ontology - based context information modelling for managing pervasive applications [C]//2006 International Conference on Autonomic and Autonomous Systems ( ICAS' 06 ). USA, IEEE Press, 2006: 47 - 52.
  • 5Weyns D, Vizzari G, Keil D, et al. Environments for multi-agent systems II[M]. Springer, Berlin, The Netherlands, 2006.
  • 6Hanson J E, Nandi P, Levine D W. Conversation - enabled web services for agents and ebusiness[ C]//Proceedings of the International Conference on Intemet Computing (IC-02). USA. CSREA Press, 2002: 791- 796.
  • 7Wache H, Vogele T, Visser U, et al. Ontology- based integration of information - a survey of existing approaches [ C]//17th International Joint Conference on Artificial Intelligence(IJCAI01). USA, 2001:108 -117.
  • 8Kagal L, Finin T, Anupam J. A policy language for a pervasive computing environrnent[ C ]// IEEE 4th International Workshop on Policies for Distributed Systems and Networks. USA: bcltimore, IEEE Press, 2003: 63-74.
  • 9Tonti G, Bradshaw J M, Jeffers R, et al. Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder [ C]// The SemanticWeb- ISWC 2003. Berlin, Springer, 2003:419- 437.
  • 10Bunke H, Glauser T, Tran T H. An efficient implementation of graph grammars based on the RETE matching algorithm[ C]//Graph Grammars and Their Application to Computer Science. Berlin, Springer, 2006(532): 174- 189.

同被引文献8

  • 1张春海,孙妍.基于CDMA2000-1X网络的城市供水监测调度系统[J].吉林大学学报(信息科学版),2005,23(5):466-473. 被引量:7
  • 2孟庆龙.基于GPRs的城市供水监控系统的设计与实现[D].山东:山东大学,2005.
  • 3Samaras C S G, Pitoura E, Evaripidou P.Mobile agent for wireless computing: the convergence of wireless computational models with mobile-agent technologies [J]. Mobile Networks and Application, 2004 (9) : 517-528.
  • 4Barron C H, George S, David B. Lindquist.Web/Express: A client/intercept based system for optimizing Web browsing in a wireless environment[J]. Mobile Networks and Application, 1998(3) :419-431.
  • 5Mike Nikitas. Improve XML Web Services Performance by Compressing SOAP. [EB/OL]. (2003).http://www.dotnetjunkies. com/Article/46630AE2-1C79-4DSF-827 E-6C2857FF1D23. dcik, 2003.
  • 6谢琦,赵丽红.Web服务安全性的研究与实现[J].计算机工程与设计,2007,28(18):4366-4369. 被引量:11
  • 7贺正求,吴礼发,洪征,王睿,李华波.Web服务安全问题研究[J].计算机科学,2010,37(8):32-39. 被引量:15
  • 8大唐电信水利物联网系统方案[J].电信技术,2010(8):46-48. 被引量:1

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部