期刊文献+

基于属性机制的Web Services访问控制模型 被引量:1

下载PDF
导出
摘要 基于属性的访问控制(ABAC)是面向Web Service应用的一种新的访问控制方法。而访问控制策略合成则是确定分布式聚合资源访问控制策略的关键。为了规范策略合成和保障策略合成正确性,基于属性刻画了实体间的授权关系,通过属性值的计算结构扩展了现有的策略合成形式化框架,建立了新的基于属性的策略合成代数模型。用代数表达式形式化地描述聚合资源的访问控制策略,说明可借助策略表达式的代数性质去验证策略合成结果是否符合各方对聚合资源的保护性需求,为聚合资源的访问控制策略评估和应用提供基础。
出处 《软件导刊》 2011年第1期136-137,共2页 Software Guide
  • 相关文献

参考文献4

二级参考文献20

  • 1戴启华,高西全,韩学义.话路时间校对和认证系统的安全策略研究[J].微计算机信息,2005,21(2):200-201. 被引量:10
  • 2A NEXOR WHITE PAPER. Privilege Management Infrastructure.http://www.nexor.com/media/whitepapers/PMI.pdf .July2003
  • 3David W.Chadwick.An X.509 Role-based Privilege Management infrastructure. BUSINESS BRIEFING:GLOBAL INFOSECURITY.http://www.infosecurity.org.cn/content/pki_pmi/rbac_pmi.pdf.2002
  • 4SET Co.SET Secure electronic transaction specification Version 1.0[EB/OL].(1997-05).http://www.visa.com//set.
  • 5Zhou Quan,Yang Geng,Shen Jian-gang.A scalable security architecture for grid[C]//The International Conference on Parallel and Distributed Computing,Applications and Technologies.
  • 6Foster I,Karonis N.A secure communications infrastructure for high-performance distributed computing[C]//IEEE Symp on Highperformance Distributed Computing,1997(6):125-136.
  • 7Foster I.网格计算[M].2版,西安:电子工业出版社,2004.
  • 8Wu Xiu-ying,Yang Geng,Shen Jian-gang,et al.A novel secu model based on virtual organization for grid[C]//The International Conference on Parallel and Distributed Computing,Applications and Technologies.
  • 9Keahey K,Welch V.Fine-grain Authorization for Resource Management in the Grid Environment[C]//Proceedings of Grid2002Workshop,2002:1100-1115.
  • 10Zhou Quan,Yang Geng.A grid portal model based on security and storage resource proxy[C]//Lecture Notes in Computer Science,2004(3314):13-18.

共引文献17

同被引文献12

  • 1Agarwal S, Sprick B. Access control for semantic Web services [C]// Proceedings of the 1st International Conference on Web Services. Washington DC, USA: IEEE Computer Society, 2004:770 - 773.
  • 2Verma D C. Simplifying network administration using policy-based management [J]. IEEE Network, 2002, 16(2) : 20- 26.
  • 3Ribeiro C, Zuquete A, Ferreira P, et al. SPL: An access control language for security policies with complex constraints [C]// Proceedings of the Network and Distributed System Security Symposium. San Diego, USA: Internet Society Press, 2001.
  • 4OASIS 2001. XACML language proposal, version 0. 8 [Z].
  • 5Herzberg A, Mass Y, Michaeli J, et al. Access control meets public key infrastructure, or assigning roles to strangers [C]// Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, USA: IEEE Computer Society, 2000: 2- 14.
  • 6Damianou N, Dulay N, Lupu E C, et al. Ponder: A Language (or Specifying Security and Management Policies for Distributed Systems, The Language Specification-Version 2. 3, Research Report DoC 2000/1 [R]. London, UK: Imperial College of Science Technology and Medicine, 2000.
  • 7Damianou N, Dulay N, Lupu E C, et al. The ponder policy specification language [C]// Proceedings of Workshop on Policies for Distributed System and Networks. Bristol, UK: Lecture Notes in Computer Science, 2001 : 18 - 39.
  • 8Damianou N, Dulay N, Impu E C, et al. Managing security in object-based distributed systems using Ponder [C]// Proceedings of the 6th Open European Summer School. Enschede, The Netherlands: Computing Publications, 2000.
  • 9Damianou N, Dulay N, Lupu E, et al. Tools for domain-based policy management of distributed systems [C]// Proceedings of the Network Operations and Management Symposium. Florence, Italy: Institute of Electrical and Electronics Engineers Inc. , 2002:203 -217.
  • 10林莉,怀进鹏,李先贤.基于属性的访问控制策略合成代数[J].软件学报,2009,20(2):403-414. 被引量:41

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部