期刊文献+

远程计算系统的访问控制策略研究 被引量:2

An Access Control Policy for Remote Computing System
下载PDF
导出
摘要 文章根据远程计算系统的结构,分析了它的安全问题,并结合基于角色的访问控制方法,提出了一种适合于该系统的RBAC层次模型。在实现过程中本文利用一种基于关系代数角色授权的方法,避免角色分配时角色之间的冲突以及保证角色撤销的完全性。同时,结合任务代理来进一步提高系统安全性。 This paper discusses the security problem of Remote Computing System according to its architecture, and presents the Role-Based Access Control (RBAC) hierarchy model applied to Remote Computing System. In order to avoid the conflicts among roles while assigning roles to different users and guarantee the operation of role revocation against imperfection, the paper uses a role allocation approach for RBAC implemented by relational algebra operations. At the same time, the security of Remote Computing System is improved through the combination of task agent conception.
出处 《微电子学与计算机》 CSCD 北大核心 2004年第5期7-10,共4页 Microelectronics & Computer
基金 国家自然科学基金资助项目(60175015) 西安交大博通股份有限公司基金资助项目
关键词 远程计算 集群 安全 访问控制 RBAC Remote computing, Cluster, Security, Access Control, RBAC
  • 相关文献

参考文献9

  • 1Brian N Bershad, Henry M Levy. A Remote Computation Facility for a Heterogeneous Environment. IEEE Computer,May, 1988, 21(5): 50~60.
  • 2Reinbard Finsterwald. A Generic Client-server Architecuture for Distributed Web -based Simulation Experimentation, Computer-Aided Control System Design,2000. CACSD 2000. IEEE International Symposium on,25-27, Sept, 2000, 185~189.
  • 3Rushikash K Joshi, D janaki Ram. Anonymous Remote Computing: a Paradigm for Parallel Programming on Interconnected Workstations. Software Engineering, IEEE Transactions on, Jan.-Feb, 1999, 25(1): 75~90.
  • 4C Bajaj, S Cutchin. Web Based Collaborative Visualization of Distributed and Parallel Simulation, Parallel Visualization and Graphics Symposium, 1999. Proceedings.1999 IEEE, 25-26 Oct, 1999, 47~54.
  • 5A Gentile, M Cossentino, etc. Intelligent Agent Mapping on a Massively Parallel MIMD Computing Platform. Proc. of 2002 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA′02), Las Vegas - USA, CSREA Press, Ⅱ, 850~855.
  • 6Crystaliz, Inc., General Magic, Inc., GMD Focus, and IBM Coorp. Mobile Agent Facility Specification. Technical report, OMG, 1997.
  • 7Ravi S. Sandhu, Role-Based Access Control Models, IEEE Computer, February, 1996, 29(2): 38~47.
  • 8Hua Wang, Jinli Cao, Yanchun Zhang. Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations, Web Information Systems Engineering, 2002. WISE 2002. Proceedings of the Third International Conference on, 12-14, Dec, 2002, 301~310.
  • 9E Gerck. Overview of Certificate Systems: X.509, CA, PGP,and SKIP, http:∥www.iks-jena.de/mitarb/lutz/ certification/mc/cert.htm.

同被引文献15

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部