期刊文献+

协作权限动态管理的赋色Petri网模型与验证

Modeling and Verification of Dynamic Management of Cooperative Permission Based on Colored Petri Nets
下载PDF
导出
摘要 针对多用户环境中协作权限动态分配与回收,及可靠性验证问题,提出基于活动、角色的协作权限动态管理机制,采用赋色Petri网建立形式化模型并分析.该模型将共享的协作文档和视图空间按照活动序列划分,角色的分配、回收与活动相关联,解决了传统访问控制中授权用户对访问对象具有持久权限的问题.最后,基于状态空间的分析表明,该模型能够实现活动依赖关系,活动角色绑定可达性及协作权限申请中死锁避免等约束条件的验证,能够满足协同设计中变化频繁的协作权限访问控制需求. Focusing on assurance of activity based dynamic assignment and retrieve of cooperative permission in multi user environ- ment, and its reliability verification, an activity-role based mechanism of cooperative permission dynamic management is proposed in this paper, and CPNs based modeling and analyzing issues are also provided. In this model, the shared cooperative document and view space are divided according to the sequence of interdependent activities, and the cooperative activities are associated with the as- signment and retrieve of role, therefore, the problem of authorized users with persistent permissions to specific object in traditional ac- cess control is solved. In the final, state space based analysis shows that constraint conditions such as dependencies between activities, reachability of activity-role binding, and deadlock prevention in applying for cooperative permission can be verified, and the require- ments of frequent change of cooperative permission are satisfied in the access control of cooperative design system.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第9期1972-1977,共6页 Journal of Chinese Computer Systems
基金 教育部长江学者和创新团队发展计划项目(IRT0951)资助 国家自然科学基金项目(50978030)资助 陕西省自然科学基金项目(2009-JM8002-1)资助
关键词 协作权限 赋色PETRI网 活动 角色 cooperative permission colored petri nets activity role
  • 相关文献

参考文献9

  • 1Shen W M,Hao Q, Li W D. Computer supported collaborative design: retrospective and perspective [ J ]. Computers in Industry, 2008,59(9) :855-862.
  • 2Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control [ J ]. ACM Transactions on Information and System Security,2001,4 (3) :224-274.
  • 3李金双,常桂然.支持用户委托的访问控制模型研究[J].小型微型计算机系统,2009,30(12):2356-2363. 被引量:1
  • 4Lu H C, Chu Y P, Sheu R K. A generic application sharing architecture based on message-oriented middleware platform [C]. Proceeding of 10th International Conference on Computer Supported Cooperative Work in Design,2006 : 1-5.
  • 5张鹏程,李人厚,秦明,田锋,顾新华.混合式应用共享机制模型的研究[J].小型微型计算机系统,2003,24(7):1124-1127. 被引量:3
  • 6李俊青,李新友,谢圣献,罗红斌,刘广亮.P2P网络动态精细粒度访问控制研究[J].计算机应用研究,2009,26(4):1467-1470. 被引量:4
  • 7Ahmed T, Tripathi A R. Security policies in distributed CSCW and workflow systems[J]. IEEE Transactions on Systems,Man,and Cybernetics Part A:Systems and Humans,2010,40(6) :1220-1231.
  • 8Park H,Hong J W, Park J H et al. Combined authentication-based multilevel access control in mobile application for daily life service[J]. IEEE Transactions on Mobile Computing, 2010,9 ( 6 ) :824 - 837.
  • 9Jensen K, Kristensen L M, Wells L. Coloured petri nets and CPN tools for modelling and validation of concurrent systems[J]. International Journal on Software Tools for Technology Transfer,2007,9 (3-4) :213-254.

二级参考文献17

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2沈海波,洪帆.基于企业环境的访问控制模型[J].计算机工程,2005,31(14):144-146. 被引量:17
  • 3翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 4ZHANG Qian,SUN Yu,LIU Zheng,et al. Design of distributed P2P- based grid content management architecture[ C]//Proc of the 3rd Annual Communication Networks and Services Research Conference. 2005:339-344.
  • 5BERKET K, ESSIARI A, THOMPSON M R. Securing resources in collaborative environments a peer-to-peer approach [ C ]//Proe of the 17th lASTED International Conference on Parallel and Distributed Computing and Systems. Phoenix : [ s. n. ] ,2005 : 14-16.
  • 6STAMP M, MATHUR A, KIM S. Role based access control and the Jxta peer-to-peer framework [ C ]// Proc of International Conference on Security & Management. 2006.
  • 7SANDHU R S, COYNE E J, FEINSTEIN H L,et al. Role-based access control models[ J]. IEEE Computer,1996,29(2) :38-47.
  • 8THOMAS R K, SANDHU R. Task-based authentication controls (TABC) :a family of models for active and enterprise-oriented authentication management [ C ]//Proc of the 11 th IFIP WG11.3 Workshop on Database Security. Lake Tahoe, Califomia, London: Chapman Hall, 1997 : 166-181.
  • 9Jonathan Grudin. Computer-supported cooperative work., history and focus[J]. IEEE Computer, 1994, (5):19-26.
  • 10Jin H. Jung Hyun S. Yang. Window capturing-based application sharing under heterogeneous window systems [J]. Comput&Graphics, 1998, 22(2-3):243-254.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部