期刊文献+

基于群组-活动的制造网格访问控制模型研究 被引量:2

Access control model for manufacturing grid based on group and activity
下载PDF
导出
摘要 针对制造网格访问控制的需求,提出一种网格环境下基于群组-活动的访问控制模型。模型对RBAC模型进行扩展,用活动对角色和权限对象进行封装,增加了活动状态、活动层次和活动依赖,实现动态的权限控制和灵活的权限粒度;用群组和群组层次表示参与协同的组织中原有组织结构和访问控制机制,保持了参与组织原有结构的自治性及权限的分布式管理。实验和安全性能分析说明了该模型的安全性和有效性。 Aiming at the access control demand of manufacturing grid,an access control model based on group and activity is proposed.The model is the extension of the hierarchical RBAC introduced the activity to encapsulate user's role and corresponding permission,and added activity state,activity hierarchy and activity dependence to provide dynamic authorization and flexible multi-granularity privileges division.To keep the autonomy of original structure of the collaborative organization and distributed permission management,group and group hierarchy are used to express original structure of the collaborative organization and its access control mechanism.The experiment results and safety analysis show that the access control model is safe and effective.
出处 《广西大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第6期940-946,共7页 Journal of Guangxi University(Natural Science Edition)
基金 广西自然科学基金重点项目(2010GXNSFD013037) 广西科技创新能力与条件建设项目子课题(09-007-05S018)
关键词 制造网格 访问控制 基于角色的访问控制(RBAC) GLOBUS Toolkit4 通知机制 manufacturing grid access control RBAC Globus Toolkit notification
  • 相关文献

参考文献13

  • 1陆宇旻,李陶深.一个网络行为实时监控系统的体系结构设计[J].广西大学学报(自然科学版),2005,30(S2):81-83. 被引量:2
  • 2TUECKE S. Grid Security Infrastructure(GSI) Roadmap[ EB/OL]. 2004 [ 2011-09-28]. http ://www. gridforum, org/security/g2-2001-0 3/darfts/draftgridforum-gsi-roadmap-02. txt.
  • 3FOSTER I, ESSELMAN C, TSUDIK G, et al. A security architecture for computational grids[ C]//The 5 th ACM Conference on Computer and Communications Security. San Francisco, USA:ACM, 1998:83-92.
  • 4WELCH V, SIEBENLIST F, FOSTER I, et al. Security for Grid Services [ C ]//Proceedings of 12th IEEE International Symposium on HPDC' 2003. Washington, USA : IEEE Computer Society, 2003:48-54.
  • 5The Globus Security Team Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective [ EB/OL ]. 2005 [2011-09-28 ]. http ://www. globus, org/toolkit/docs/4. 0/security/GT4-GSI-Overview. pdf.
  • 6PERRLMAN L, WELCH V, OSTER I, et al. A community authorization service for Group collaboration [ C ]//Proceedings of POLICY2002. Washington, USA : IEEE Computer Society, 2002:50-59.
  • 7ROBIETTE A. The Akenti Authorisation System [ EB/OL ]. 2004 [ 2011-09-28 ], http ://www. nesc. ac. uk/action/esi/ download, cfm? index = 428.
  • 8DEMCHENKO Y, GOMMANS L,TOKMAKOFF A, et al. Policy based access control in dynamic grid-based collaborative environment [ C ]//Proceedings of CTS' 2006. Las Vegas, USA : IEEE Computer Society, 2006:64-73.
  • 9YAO H B, HU H P, HUANG B H, et al. Dynamic role and context-based access control for grid applications[ C]//Proceedings of the PDCAT' 2005. Washington, USA: IEEE Computer Society, USA: IEEE Computer Society,2005:404406.
  • 10CAI H X, YU T, FANG M L. Dynamic access control for manufacturing grid [ C ]//2005 IEEE International Symposium on Communications and Information Technology. Piscataway, USA: IEEE NJ, 2005:917 - 920.

二级参考文献10

共引文献8

同被引文献19

  • 1唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3肖尚勤,卢正鼎,凌贺飞,邹复好.基于P2P系统信任机制的DRM模型[J].计算机研究与发展,2007,44(4):567-573. 被引量:7
  • 4陈建刚,王汝传,王海艳.信任机制及其在网格安全中的应用[J].计算机科学,2007,34(7):80-83. 被引量:2
  • 5孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36
  • 6Josang A, Bhuiyan T. Optimal trust network analysis with subiective logic [C]. Cap Esterel, France: Proceedings of the Second International Conference on Emerging Security In formation, Systems and Technologies, 2008: 179-184.
  • 7Josang A, Golbeek J. Challenges for robust of trust and reputation systems [C]. Saint Malo, France: Proceedings of the 5th International Workshop on Security and Trust Manage ment, 2010: 159.
  • 8Stanley Milgram, Six degrees of separation [EB/OL]. http: //en. wikipedia. org/wiki/Six_degrees_of separation, 2009.
  • 9BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management [ C ]//The 17th Symposium on Security and Priva- cy. Oakland : IEEE Computer Society Press, 1996 : 164-173.
  • 10BLAZE M, FEIGENBAUM J, STRAUSS M. Compliance Checking in the Policy Maker Trust Management System [ C ]// The Financial Cryptography, Lecture Notes in Computer Science. Anguilla, British West Indies: Springer-Verlag, 1998: 254 -274.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部