期刊文献+

数字城市服务自适应访问控制模型

Adaptive service access control model for intelligent city
下载PDF
导出
摘要 传统访问控制模型不适合数字城市异构、跨域、动态变化的特征,容易造成用户使用服务信息的泄露。本文在分析传统访问控制模型基础上,结合数字城市服务特点,设计了数字城市网络中细粒度访问控制模型,给出自适应访问控制策略及实施策略算法并对其性能进行了分析。分析结果表明该模型能够满足不断变化或扩展的动态安全需求,而且相比传统访问控制模型,性能也得到了提高。 Secure access to the services in intelligent city is challenging, because of the computing environment with heterogeneous modalities. Conventional static access control mechanisms are not able to accommodate complex secure access requirements. An adaptive secure access mechanism to address this problem is proposed. It not only adapts access control policies to diverse requirements but also introduces adaptation access control algorithms during the service invocation. Through the analysis of the performance of the algorithms, it is proved that the model can fulfill the dynamic security requirements in intellizent city. and compared to the traditional models, the performance of this model is superior.
作者 赵丽 孙彬
出处 《电子设计工程》 2013年第2期19-23,共5页 Electronic Design Engineering
关键词 访问控制模型 控制策略 实施策略算法 数字城市 access control model control policies implementation of the strategy algorithm intelligent city
  • 相关文献

参考文献11

  • 1Csaba S,Karoly F,Zoltan H. Wireless community networks:motivations,design and business models[J].Mobile Networks and Applications,2008,(04):121-125.
  • 2LI Jun,ALAN H K. Access control for services oriented architecture[A].Fairfax,Virginia,USA,2006.
  • 3刘宏月,范九伦,马建峰.访问控制技术研究进展[J].小型微型计算机系统,2004,25(1):56-59. 被引量:76
  • 4Sandhu R. Lattice-based access control models[J].IEEE Transaction on Computer,1993,(11):9-19.
  • 5Sandhu R,Coyne E,Feinistein H. Role-based access control models[J].IEEE Transaction on Computer,1996,(06):38-47.
  • 6熊善清,张颖江.基于角色的访问控制模型分析及实现研究[J].武汉理工大学学报(信息与管理工程版),2006,28(2):29-31. 被引量:9
  • 7王小明,付红,张立臣.基于属性的访问控制研究进展[J].电子学报,2010,38(7):1660-1667. 被引量:84
  • 8Yuan E,Tong J. Attribute based access control (ABAC) for web services[A].Orlando,Florida,USA,2005.
  • 9Thomas R K,Sandhu R S. Towards a task-based paradigm for flexible and adaptable access control in distributed applications[A].1993.138-142.
  • 10Thomas R K,Sandhu R S. Task-Based authentication controls(TABC):a family of models for activeand enterpriseoriented authentication management[A].Vancouver,Canada,1997.

二级参考文献72

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2Sandhu R S, Coyne E J, Feinstein H L, Youman C E. Role-Based Access Control Models[J]. IEEE Computer, 1996, 29(2):38-47.
  • 3Park J S, Sandhu R S. Role-Based Access Control on the Web [J]. ACM Transactions on Information and System Security, 2001, 4(1):37-71.
  • 4M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 5V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 6E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 7C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 8J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 9J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 10D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.

共引文献165

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部