期刊文献+

基于角色映射的服务组合访问控制架构

Access Control Architecture of Service Composition Based on Role Mapping
下载PDF
导出
摘要 提出了一种基于角色映射的服务组合访问控制体系架构,用来解决服务组合过程中的访问控制问题。架构主要由服务组合访问控制中心和若干服务组合访问控制节点组成,服务组合访问控制中心的核心功能是建立和维护各服务所在安全域之间的角色映射信息,并从全局角度协调服务组合中的访问控制,服务组合访问控制节点是对各安全域访问控制系统的抽象,是访问控制的实施点,具有独立性。在此基础上,架构采用广泛应用于分布式环境的"推模式"授权机制,在实现服务组合中各服务之间的安全调用与协同的同时,又能在很大程度上保持各服务所在安全域的相对独立性和安全性,因而提出的架构具有较好的适应能力和可扩展性。 An access control architecture based on role mapping for service composition is proposed to solve the access control problem in service composition process. The architecture is composed of an access control center and some access control nodes. The core functions of the access control center are to set up and maintain the role mapping information among the security domains, and harmonize the access control for the service composition from the global perspective. The access control node is an abstraction for the access control system of each security domain, and it is the execution point for access control with independence. Furthermore, the architecture adopts an authoriza- tion mechanism called "push mode" that is widely applied in distributed environment. Consequently, not only the access control of service composition can be well implemented in the architecture, but also the independence and security of the participant domains can be pre- served. Thus the applicability and extensibility of the proposed architecture is finer relatively.
出处 《计算机技术与发展》 2015年第10期149-153,共5页 Computer Technology and Development
基金 江苏省自然科学基金(BK2010132)
关键词 服务组合 访问控制 角色映射 安全域 service composition access control role mapping security domain
  • 相关文献

参考文献14

  • 1Bertino E, Lorenzo D, Paci F, et al. Security for Web service and service-oriented architectures [ M ]. Berlin : Springer-Ver- lag ,2010.
  • 2林莉,怀进鹏,李先贤.基于属性的访问控制策略合成代数[J].软件学报,2009,20(2):403-414. 被引量:41
  • 3Shehab M, Ghafoor A. Web services discovery in secure collaboration environments [ J ]. ACM Transactions on Internet Technology,2009,8( 1 ) :89-110.
  • 4Du S, Joshi J B D. Supporting authorization query and inter- domain role mapping in presence of hybrid role hierarchy [C]//Proc of the llth ACM symposium on access control, models and technologies. Lake Tahoe, California, USA: [ s. n. ] ,2006:228-236.
  • 5Li R X,Tang Z, Lu Z D. Request-driven role mapping frame- work for secure interoperation in multi-domain environments [J]. International Journal of Computer Systems Science and Engineering ,2008,23 ( 3 ) : 193-206.
  • 6付长胜,肖侬,赵英杰,陈涛.基于协商的跨社区访问的动态角色转换机制[J].软件学报,2008,19(10):2754-2761. 被引量:7
  • 7Ferraiolo D, Sandhu R, Gavrila S, et al. Proposed NIST stand- ard for role-based access control [ J ]. ACM Transactions on Information and System Security ,2001,4( 3 ) :224-274.
  • 8贺正求,吴礼发,李华波,王睿,黄康宇.请求驱动的服务组合访问控制[J].东南大学学报(自然科学版),2011,41(3):443-448. 被引量:3
  • 9邴晓燕,邵贝恩.基于SOA的企业应用跨安全域访问控制[J].清华大学学报(自然科学版),2009(7):1066-1069. 被引量:16
  • 10Hristo K, Fabio M. An access control framework for business processes for Web services [ C ]//Pmc of the ACM workshop on XML security. Fairfax VA, USA : ACM ,2010 : 15-24.

二级参考文献22

  • 1武小年,肖侬.数据网格系统GridDaen安全机制的设计与实现[J].计算机工程与科学,2006,28(2):14-15. 被引量:1
  • 2陈颖,杨寿保,郭磊涛,申凯.网格环境下的一种动态跨域访问控制策略[J].计算机研究与发展,2006,43(11):1863-1869. 被引量:21
  • 3HUAI Jinpeng HU Chunming LI Jianxin SUN Hailong WO Tianyu.CROWN:A service grid middleware with trust management mechanism[J].Science in China(Series F),2006,49(6):731-758. 被引量:8
  • 4Morita I. Toward realization of service-oriented architecture[J]. Fujitsu Sci and Tech J, 2006, 42(3): 306 -315.
  • 5Phan C. Service-oriented architecture (SOA)--Security challenges and mitigation strategies [C] // Military Communications Conference. Piscataway, N J: IEEE Press, 2007 : 1 - 7.
  • 6Kanneganti R, Chodavarapu P. SOA Security [M]. Greenwich: Manning Publications Co, 2008.
  • 7Chou W. Inside SSL: Accelerating secure transactions [J]. IT Professional, 2002, 4(5) : 37 - 41.
  • 8Gudivada V N, Nandigam J. Enterprise application integration using extensible Web services [C] // 2005 IEEE International Conference on Web Services. Piscataway, NJ: IEEE Computer Society Press, 2005 : 41 - 48.
  • 9Singhal A, Winograd T, Scarfone K. Guide to secure Web service, NIST Special Publication 800-95[R]. Gaithersburg, MD, USA: National Institute of Standards and Technology, 2007.
  • 10Menzel M, Wolter C, Meinel C. Access control for cross-organizational Web service composition [ C ]// Proc of the International Multiconference on Computer Science and Information Technology. Wisla, Poland,2007:701 -711.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部