期刊文献+

面向分层式资源的基于属性的访问控制方法 被引量:4

Attribute Based Access Control Method Oriented to Hierarchical Resource
下载PDF
导出
摘要 针对Internet上经常使用的分层式资源管理模型,提出一种基于属性的访问控制模型HR_ABAC,采用XACML国际标准作为该模型的策略描述语言,研究实现基于属性的访问控制决策机制。对该决策机制进行测试与分析,结果表明所实现的基于属性的访问控制方法具有有效性和实用性。 This paper presents an Attribute Based Access Control(ABAC) model HR ABAC for hierarchical resource model which is commonly used in Internet. An access control decision mechanism is proposed and implemented for this model by using cXtensible Access Control Markup Language(XACML). It tests and analyzes this decision mechanism, and result indicates the mechanism is valid and practical.
作者 陈凯 郎波
出处 《计算机工程》 CAS CSCD 北大核心 2010年第7期132-135,共4页 Computer Engineering
基金 国家"863"计划基金资助项目"网格计算中基于属性的访问控制模型及实现方法研究"(2006AA01Z441) 国家"863"计划基金资助重点项目"可信的国家软件资源共享与协同生产环境之面向服务的软件生产线"(2007AA010301-02)
关键词 基于属性的访问控制 可扩展访问控制标记语言 策略决策点 策略管理点 Attribute Based Access Control(ABAC) eXtensible Access Control Markup Language(XACML) policy decision point policy administration point
  • 相关文献

参考文献5

  • 1Yuan E, Tong Jing. Attribute Based Access Control(ABAC) for Web Services[C]//Proc. of the IEEE International Conference on Web Services. Piscataway, USA: IEEE Computer Society, 2005: 561-569.
  • 2Perlman R. An Overview of PKI Trust Models[J]. IEEE Network, 1999, 13(6): 38-43.
  • 3Lang Bo, Foster I, Siebenlist F, et al. Attribute Based Access Control for Grid Computing[EB/OL]. (2006-04-25). ftp://inlb.mcs.anl.gov/ pub/tech reports/reports/P 1367.pdf.
  • 4Park J S, Sandhu R. Smart Certificates: Extending X.509 for Secure Attribute Service on the Web[C]//Proc. of National Information Systems Security Conference. Arlington, USA: [s. n.], 1999: 340-346.
  • 5OASIS. eXtensible Access Control Markup Language(XACML) Version 2.0[EB/OL]. (2005-02-01). docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0-core-spec-os.pdf.

同被引文献18

  • 1沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 2沈海波,洪帆.面向Web服务的基于属性的访问控制研究[J].计算机科学,2006,33(4):92-96. 被引量:12
  • 3David F Ferraio]o,Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Transactions on In- formation and System Security,2001,4 ( 3 ) :224 - 274.
  • 4Yuan E, Tong Jing. Attribute Based Access control ( ABAC ) for Web Services [ C ]//Proe. of the IEEE International Conference on Web Services. Piseataway,USA:IEEE Computer Society,2005:561 -569.
  • 5OASIS Standard. eXtensible Access Control Markup Language (XAC- ML) Version 2.0 [ EB/OL]. 2008. http ://docs. oasis-open, org/xac- ml/2.0/access_contml-xacml-2.0-core-spec-os, pelf.
  • 6W3C Note. Simple Object Access Protocol (SOAP) 1.1[EB/OL]. 20(30- 05. http://www, w3. org/TR/2000/NOTE-SOAP20000508/. 08.
  • 7Benjamin Mitchell. Web Services Enhancements (WSE) Technical Arti- cles:Why WSE[EB/OL]. 2005 -02. http://msdn2, microsoft, com/en- us/library/ms996935, aspx.
  • 8Shelly A,Brotherton R T,Fried E S.Norman PMI GlobalCongress Applying the Work Breakdown Structure to the ProjectManagement Lifecycle. Proc.of 2008 PMI Global Congress . 2008
  • 9Glenwright E T.Let’’s Scrap the Precedence DiagrammingMethod. Proc.of AACE’’04 . 2004
  • 10Bates J.AACE International Recommended Developing ActivityLogic Practices. . 2004

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部