期刊文献+

信息网格访问控制的研究

Research on Accessing Control in Information Grid
下载PDF
导出
摘要 访问控制是信息网格安全机制的重要方面,它影响到网格系统中用户的操作行为。该文对信息网格及其访问控制的关键问题进行研究,通过分析信息网格的多管理域特点,进一步提出了一个基于函数的访问控制模型,从而解决跨域访问带来的安全性问题。 Access control is an important aspect of grid security mechanism, it affects the users" behaviors in grid system. This article researched on the information grid and its key issues, by analyzing the information of the grid features multiple domains, and further proposed a function-based access control model to solve cross-domain access to bring the security issues.
作者 邵桂伟 SHAO Gui-Wei (Hefei University, Hefei 230601, China)
机构地区 合肥学院
出处 《电脑知识与技术》 2011年第12期8820-8822,共3页 Computer Knowledge and Technology
基金 合肥学院科研发展基金(09KY09ZR)
关键词 信息网格 访问控制 角色 函数 information grid Access control role function
  • 相关文献

参考文献7

  • 1徐志伟,李晓林,游赣梅.织女星信息网格的体系结构研究[J].计算机研究与发展,2002,39(8):948-951. 被引量:64
  • 2邵桂伟,余本功,杨善林.一种针对信息网格RBAC模型私有权限问题的有效解决方案[J].计算机应用研究,2007,24(4):133-135. 被引量:7
  • 3雷钧.角色继承和层次关系分析[J].湖北汽车工业学院学报,2006,20(1):44-46. 被引量:5
  • 4Foster I,Kesselman C,Tuecke S.The anatomy of the grid: Enabling scalable virtual organizations[J].International journal Supercomputer A ppl ications,2001,15(3) :200-222.
  • 5Ferraiolo D F,Sandhu R, Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Trans on Information and System Security,2001,4(3):224-274.
  • 6Ferraiolo D F,Barkley J F,Kuhn D R.A Role-Based Access Control Model and Reference Implementation Within a Corporate Internet[J].ACM Transaction on information and System Security,1999,2(1):3-6.
  • 7Pfeifer T.Internet-Intranet-Infranet: A Modular Integrating Architecture[C].Proceedings of the The Seventh IEEE Workshop on Future Trends of Distributed Computing Systems,2000.

二级参考文献14

  • 1张正球,章志明,余敏.基于Web的信息系统中RBAC的实现[J].计算机与现代化,2005(1):70-73. 被引量:4
  • 2雷钧.基于角色的访问控制在权限管理中的研究[J].湖北汽车工业学院学报,2005,19(1):50-52. 被引量:10
  • 3褚兴军 徐志伟.企业门户框架的数据描述、控制及操作[J].计算机研究与发展,2001,38:187-192.
  • 4Lorna Uden.Design Process for Web Applications [J ].IEEE MultiMedia,2002,9(4) :47-55.
  • 5Ravi S. Sandhu, Edward J. Coyne,Hal L. Feinstein,et al.Role-based Access Control Models[J]. IEEE Computer, 1996,29(2):38-47.
  • 6ZaHir Tari, Shun-Wu Chan. A Role-based Access Control for Intranet Security [J]. IEEE Internet Computing,1997,1 (5) :24-34.
  • 7M. Hitchens,V. Varadharajan. Design and Specification of Role Based Access Control Policies [J]. IEEE Procding Software ,2000,147(4):117-129.
  • 8SANDHU R. Role-based access control models [ J ]. IEEE Computer, 1996,29 ( 2 ) :8- 47.
  • 9SANDHU R S, BHAMIDIPATI V Q, MUNAWER. The ARBAC97 model for role-based administration of roles[ J]. ACM Transactions on Information and System Security, 1999,2 (1) :105-135.
  • 10OSBORN S, SANDHU R, MUNAWER Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[ J]. ACM Transactions on Information and System Security, 2000,3(2) :85-106.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部