期刊文献+

一种普适计算下的访问控制策略 被引量:3

An Access Control Scheme for Pervasive Computing
下载PDF
导出
摘要 计算技术的发展是以为人类服务为目标的,需要一种"以人为本"的计算模式,而普适计算正是这样的一种革新性的计算模式。访问控制作为一种重要的安全措施在系统安全中得到了广泛应用,而普适计算模式下的系统安全也需要一种合适的访问控制策略。为此,比较了现有访问控制模型的各自特点和适用范围,分析了普适计算环境下访问控制策略的特殊要求,在此基础上详细描述了普适计算模式下动态访问控制策略实现方法。并在ARM7嵌入式实验箱现有资源基础上模拟了普适环境下考虑上下文信息的访问控制中的部分机制。 The development of computing science is to serve human,so it needs a people centered computing paradigm,and ubiquitous computing breeds as such an innovatory computing model.Access control is widely applied to system security as an important safety precaution,and system security in pervasive computing likewise needs an appropriate strategy.For that purpose,compare the characteristics and application scope of the existing access control models,analyze the special access control policy requirements in pervasive environments.On these bases,give a minute description on implementation method of dynamic access of pervasive computing.And simulated part of the dynamic access control mechanism in pervasive computing using available resources of ARM7 embedded experimental box.
出处 《计算机技术与发展》 2010年第8期91-95,共5页 Computer Technology and Development
基金 安徽省自然科学基金(070412043) 安徽高校省级自然科学研究重点项目(2006KJ024A)
关键词 普适计算 访问控制 上下文相关 基于角色 pervasive computing access control context-aware role-based
  • 相关文献

参考文献11

二级参考文献68

  • 1张永勇,陈福民.网络计算的OGSA应用模型[J].微型电脑应用,2004,20(8):52-53. 被引量:2
  • 2钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 3朱斐.一种结构化文件的访问控制模型的设计和实现[J].微机发展,2005,15(4):132-134. 被引量:6
  • 4Thomas R K, Sandhu R S. Toward a task- based paradigm for flexible and adaptable access control in distributed applications[A]. In: Proc of 1992-1993 ACM SIGSAC New Security Paradigms Workshops[C]. NY: [s. n.], 1993. 138-142.
  • 5Sandhu R S, Conyne E J, Lfeinstein H, et al. Role-Based Access control Model[J]. IEEE Computer, 1996, 29(2):38-47.
  • 6Kandala S, Sandhu R. Secure Role- Based Workflow Models[A]. In: Proceedings of the 15th IFIP WG 11.3 Working Conference on Database Security [C]. Niagara, Ontario,Canada:[s.n.], 2002.45-58.
  • 7Oh S, Sandhu R. A Model for Role Administration Using Organization Structure [A]. In: Seventh ACM Symposium on Access Control Models and Technologies(SACMAT'02)[C].Monterey, California, USA: [s. n.],2002. 155-162.
  • 8Abowd G D, Dey A K, Brown P J, Davies N, Smith M,Steggles P. Towards a better understanding of context and context-awareness. In: Gellersen H Wed. Handheld and Ubiquitous Computing. Berlin: Springer, 1999. 304-307.
  • 9Castro P, Muntz R. Managing context data for smart spaces.IEEE Personal Communications, 2000, 7(5): 44-46.
  • 10Weiser M. The computer for the twenty-first century. Scientific American, 1991, 265(3): 94-104.

共引文献503

同被引文献21

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部