期刊文献+

联盟环境下基于属性存取的跨域认证授权机制

Cross-domain authentication and authorization mechanism based on attribute access in federated environment
下载PDF
导出
摘要 在隐私得到保护的前提下,为了解决位于不同自治域的主体之间动态地交换数据和实现资源共享的问题,提出了一个基于属性的授权机制。该机制依赖于信任的第三方或联盟中心,对位于各组织中的主体和对象的属性进行映射,以属性集合作为主体的代表,确保不同组织的属性集合具有一致的存取权限。在本机制中给出了跨域属性映射的模型和服务策略,并结合模型给出其工作流程,实现跨安全域的身份验证并进行授权。 In order to solve the problem of being able to exchange data and share resources dynamically under the premise of protecting privacy between subjects located in different autonomous domains,an attribute-based authorization mechanism is proposed.The mechanism relies on a trusted third party or federation center to map the attributes of the principals and objects located in each organization,with the attribute set as the representative of the subjects,ensuring that the attribute sets of different organizations have consistent access rights.In this mechanism,the cross-domain attribute mapping model and the service strategy are given,and the workflow is given according to the model.Authentication and authorization about the cross-security domain are implemented.
作者 刘其群 Liu Qiqun(Henan Agricultural Vocational College,Zhengzhou,Henan 451450,China)
出处 《计算机时代》 2018年第9期14-16,20,共4页 Computer Era
基金 河南省郑州市科技局科技攻关项目"跨域认证授权机制的研究"(20150279)
关键词 隐私 授权机制 联盟中心 属性映射 服务策略 privacy authorization mechanism federation center attribute mapping service strategy
  • 相关文献

参考文献3

二级参考文献30

  • 1刘婷婷,汪惠芬,张友良.支持授权的基于角色的访问控制模型及实现[J].计算机辅助设计与图形学学报,2004,16(4):414-419. 被引量:9
  • 2郑芳,程颖,王林平.基于属性证书的RBAC实现模型研究[J].计算机与数字工程,2005,33(2):60-63. 被引量:3
  • 3黄刚,王汝传.基于XACML的网格访问控制研究[J].计算机系统应用,2007,16(8):48-51. 被引量:2
  • 4Thomas R K, Sandhu R. Task-based Authorization Controls (TBAC):A Family of Modds for Active and Enterprise- oriented Authorization Management [ C ]//Proceedings of the 11th IFIP WGll. 3 on Database Security, Vancouver, Canada, 1997: 166-181.
  • 5Oh S, Park S. Task-role-based Access Control Models [ J ]. Information Systems, 2003, 28(6) : 533 -562.
  • 6Ferraiolo D, Sandhu R. Proposed NIST Standard for Role- based Access Control[J]. ACM Transactions on Information and System Security, 2001,4(3) : 224 -274.
  • 7PAPAZOGLOU M. Service-oriented computing: con- cepts, characteristics and directions [C]// 4th Interna- tional Conference on Web Information Systems Engineer- ing. Rome, Italy: IEEE, 2003: 3-12.
  • 8MILANOVIC N, MALEK M. Current solutions for Web service composition [J]. IEEE Internet Compu- ting, 2004, 8(6): 51-59.
  • 9SRIVATSA M, IYENGAR A, MIKALSEN T, et al, An access controlsystem for Web service compositions[C]// IEEE International Conference on Web Services . Salt Lake City, USA: IEEE, 2007:1-8.
  • 10ZHANG Y , JOSHI J. A request-driven secure interop- eration framework in loosely-coupled multi-domain envi- ronments employing RBAC policies [C]// IEEE Inter- national Conference on Collaborative Computing: Networ- king, Applications and Worksharing. New York, USA: IEEE, 2007:25 - 32.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部