期刊文献+

网格环境中基于语义的ABAC属性研究

Attribute research of ABAC based on semantic in grid environment
下载PDF
导出
摘要 为解决网格环境中域间互操作时基于属性的访问控制(attribute based access control,ABAC)策略之间的语义异构问题,提出一种利用属性语义信息辅助域间安全策略表示的方法。根据主客体及环境属性的多样性和二义性等特点,对EduPerson规范、SAML属性轮廓、QoS测度等领域知识进行分析,并构建出SHIQ(D)描述逻辑的通用属性本体UniAttOnt。在此基础上,给出了利用本体知识使用属性语义信息辅助属性一致性检测和策略表示等的具体方法,最后的实例分析表明了该方法的可行性。 To solve the heterogeneous semantic problems of the ABAC policies in grid environment,a method to assist the security policy representation using semantic attribute information between domains is proposed. Based the diversity and ambiguity feathers of the subject,object and environment attributes,the EduPerson specification,SAML attribute profile and QoS measures are analyzed and the universal attribute ontology UniAttOnt based on the SHIQ (D) description logic is constructed. Based on these,the concrete methods to assist the attribute consistency check and policy representation utilizing ontology knowledge and semantic attribute information are provided. Finally,a case study is showed to verify the feasibility of the method.
作者 胡殿友 张斌
出处 《计算机工程与设计》 CSCD 北大核心 2010年第14期3174-3176,3184,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2006AA01Z457)
关键词 基于属性的访问控制 属性本体 描述逻辑 一致性检测 策略表示 ABAC attribute ontology description logic consistency check policy representation
  • 相关文献

参考文献8

  • 1Welch V,Foster I,Scavo T,et al.Scaling TeraGrid access:A roadmap for attribute based authorization for a large cyberinfrastructure[EB/OL],http://gridshib.globus.org/docs/,2006.
  • 2王治纲,王晓刚,卢正鼎,李瑞轩.OntoRBAC:基于本体的RBAC策略描述与集成[J].计算机科学,2007,34(2):82-85. 被引量:8
  • 3Su L,Chadwich D,Basden A,et al.Automated decomposition of access control policies[C].Stockholm,Sweden:Proc 6th IEEE International Workshop on Policies for Distributed Systems and Networks,2005:3-13.
  • 4Trivellato D,Spiessens F,Zannone N,et al.POLIPO:Policies and OntoLogies for interoperability,portability,and autonomy[C].London,UK:Proc 10th IEEE International Symposium on Policies for Distributed Systems and Networks,2009:110-113.
  • 5Finin T,Joshi A,Kagal L,et al.ROWLBAC:Role based access control in OWL[C].Estes Park,CO,USA:Proc 13th ACM Symposium on Access Control Models and Technologies,2008:73-82.
  • 6Baader F,Calvanese D,McGuinness D,et al.The description logic handbook:Theory,implementation,and applications[M].Cambridge:Cambridge University Press,2003.
  • 7Internet2 middleware architecture committee for education,directory working group.edu person object class specification[EB/OL].http://middleware.internet2.edu/edupersen/docs/,2008.
  • 8Cantor S,Hazelton K.MACE-Dir SAML attribute profiles[EB/OL].http://middleware.internet2.edu/dir/docs/,2008.

二级参考文献10

  • 1Uszok A, Bradshaw J, Jeffers R, et al. KAoS Policy Management for Semantic Web Services. IEEE Intelligent Systems,2004, 19(4): 32-41
  • 2Baader F, Nutt W. Basic Description Logics. In: the Description Logic Handbook, F. Baader, D. Calvanese, D.L. McGuinness,et al,eds. Cambridge University Press, 2002. 47-100
  • 3Horrocks I, Patel-Schneider P F, Boley H, et al. SWRL: A semantic Web rule language combining owl and ruleml. W3C Member Submission, 21 May 2004. Available at: http://www. w3.org/Submission/SWRL/
  • 4Damianou N, et al. The Ponder Policy Specification Language.In: Proc. Policy 2001, Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001. 18-39
  • 5Koch M, Mancini LV, Parisi-Presicce F. A graph-based formalism for rbac. ACM Transactions on Information and System Security (TISSEC), 2002. 332-365
  • 6Jajodia S, Samarati P, Sapino M, et al. Flexible support for multiple access control policies. ACM Transactions on Database Systerns, 2001. 214-260
  • 7Bertino E, Catania B, Ferrari E, et al. A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC), 2003. 71-127
  • 8Joshi J B D, Bhatti R, Bertino E, et al. Access Control Language for Multidomain Environments. IEEE Internet Computing, 2004,8(6):40-50
  • 9Moses T, et al. eXtensible Access Control Markup Language(XACML)Version 2. 0. http://docs.oasis-open.org/xacml/2.0/access-control-xacml-2. 0-core-spec-os, pdf. 30 Sep. 2004
  • 10Kagal L, et al. A Policy Based Approach to Security for the Semantic Web. In:Proc. 2nd International Semantic Web Conference (ISWC2003), Sanibel Island, Florida, USA, 2003. 402-418

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部