期刊文献+

一种基于移动P2P系统的访问控制框架 被引量:3

Access Control Framework Based on Mobile P2P System
下载PDF
导出
摘要 针对移动P2P网络中的对等端容易耗尽系统资源、受到拒绝服务攻击等问题,提出了一种访问控制框架。在RBAC模型的基础上提出MT-RBAC访问控制框架,模型使用了空间上下文、信任约束和资源控制来实现移动P2P系统的访问控制机制。有效地避免了恶意节点的资源请求对系统资源的消耗,提高了系统可用性。 In order to solve the problem which has existed in the mobile p2p network, for example, the excessive consumption of system resources and the attacks of denial service, a new access control is proposed in this paper. Based on RBAC access control framework, MT-RBAC access control framework adopts the techniques of spatial context, trust constraint and resource control to achieve the access control mechanism of the Mobile P2P System. The new access control framework can effectively and efficiently increase the usability of the system, and prevent the system from the irrational resource request from spite nodes.
出处 《计算机系统应用》 2011年第8期156-159,共4页 Computer Systems & Applications
基金 国家自然科学基金(60573142) 上海市重点学科建设项目(S30504)
关键词 移动P2P 访问控制 信任模型 mobile peer to peer access control trust model
  • 相关文献

参考文献5

二级参考文献72

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 2DUMA C, SHAHMEHRI N, CARONNI G. Dynamic trust metrics for peer-to-peer systems [ C]//Proceedings of the 16th International Workshop on Database and Expert Systems Applications. Washington, DC: IEEE Computer Society, 2005: 776-781.
  • 3WANG LEI, ZHU YAN-QIN, JIN LAN-FANG, et al. Trust mechanism in distributed access control model of P2P networks [ C]//Proceedings of the 7th IEEE/ACIS International Conference of Computer and Information Science. Portland: IEEE Press, 2008:19-24.
  • 4WANG Y, VASSILEVA J. Bayesian network trust model in peer-to- peer networks[ C]//Proceedings of the 2nd International Workshop on Agents and Peer-to-Peer Computing. Berlin: Springer-Verlag, 2004.: 23 - 34.
  • 5WALKERDINE J, LOCK S. Towards secure mobile P2P systems [ C]//ICIW: Proceedings of the Second International Conference of Intern and Web Applications and Services. Washington, DC: IEEE Computer Society, 2007: 6.
  • 6马新新,耿技.对等网络信任和信誉机制研究综述[J].计算机应用,2007,27(8):1935-1938. 被引量:12
  • 7OpenGIS Consortium. OpenGIS simple features specification for SQL. In: Technical Report OGC 99-049. 1999
  • 8Smith G W. The modeling and representation of security semantics for database applications. Dissertation for the Doctoral Degree. Fairfax: George Mason University, 1990
  • 9Kumar A, Karnik N, Chafle G. Context sensitivity in role-based access control. ACM SIGPOS Op Syst Rev, 2002, 36(3): 53-66
  • 10Covington M, Moyer M, Ahamad M. Generalized role-based access control for securing future applications. In: Proceedings of 23rd National Information Systems Security Conference. Washington: IEEE Computer Society Press, 2003. 416-427

共引文献26

同被引文献24

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部