期刊文献+
共找到482篇文章
< 1 2 25 >
每页显示 20 50 100
Authentication and Access Control in RFID Based Logistics-customs Clearance Service Platform 被引量:4
1
作者 Hui-Fang Deng Wen Deng +1 位作者 Han Li Hong-Ji Yang 《International Journal of Automation and computing》 EI 2010年第2期180-189,共10页
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication an... The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems. 展开更多
关键词 Content security unified identity authentication control transfer access control logistics-customs clearance service platform (LCCSP).
下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
2
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
3
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
下载PDF
Access Control Policy Analysis and Access Denial Method for Cloud Services 被引量:1
4
作者 Chi-Lun Liu 《Journal of Electronic Science and Technology》 CAS 2013年第2期176-180,共5页
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme... Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 展开更多
关键词 access control cloud services ONTOLOGY PAYMENT service level agreement.
下载PDF
Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications 被引量:1
5
作者 Alaa Omran Almagrabi A.K.Bashir 《Computers, Materials & Continua》 SCIE EI 2021年第6期3649-3667,共19页
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain ... The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and applications.The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services.However,the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness.It results in degrading security through unattended access control for limited-service users.In this article,a service-aware access control procedure(SACP)is introduced to address the afore-mentioned issue.The proposed SACP denes attended access control for all the service session by identifying the users and service provider availability.The distributed nature of the ledger systems and classication tree learning are combined to determine unattended access.The sole access is determined by summarizing the closed and open access requests and the service provider’s availability and integrity checks.In this process,the learning process classies the secured access request and completed the integrity checks of the current and previous service dissemination.This classication-based access administration reduces the service disconnections and false access rate of the applications. 展开更多
关键词 access control blockchain classication trees service dissemination unattended access
下载PDF
Trust-Compensation-Based Access Control Model for Web Services 被引量:1
6
作者 Yan Danfeng Sun Jing +1 位作者 Zhang Liying Yang Fangchun 《China Communications》 SCIE CSCD 2012年第12期8-21,共14页
For most current Web Service access control methods, Web Service providers create a series of access control roles based on specified attributes. Only by meeting all the roles can a subject obtain the access to necess... For most current Web Service access control methods, Web Service providers create a series of access control roles based on specified attributes. Only by meeting all the roles can a subject obtain the access to necessary operations and resources. However, because of the dynamic and open traits of Web Services, it is difficult for Web Service providers to work out an access control policy with moderate intensity and to realize a satisfactory balance between protecting the security of resources and maintaining the service reachable rate. To provide a solution to the above problem, this paper proposed a trust compensation access control method based on the Attribute-Based Access Control model. Our main contributions include a formal description of the access control method, a method to calculate the attribute trust degree based on time decay, and the trust compensation value of the attribute trust degree, as well as a new Service Oriented Architecture (SOA) architecture and its procedures based on a detailed trust compensation access control method. 展开更多
关键词 access control trust compensation web service feedback
下载PDF
Joint power control based on service factor for code division multiple access system
7
作者 陈波 戎蒙恬 胡威 《Journal of Shanghai University(English Edition)》 CAS 2008年第5期414-418,共5页
An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A ... An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A joint power control algorithm based on service factor is presented to address the TDD-CDMA mobile services in the burst mode according to the Markov modulated Bernoulli process. The joint power control equation is derived. A function model is developed to verify the new algorithm and evaluate its performance. Simulation results show that the new power control algorithm can estimate interference strength more precisely, speed up convergence of power control, and enhance power efficiency and system capacity. It is shown that the proposed algorithm is more robust against link gain changes, and outperforms the reference algorithms. 展开更多
关键词 code division multiple access (CDMA) time division duplex (TDD) power control Markov process service factor
下载PDF
A Secure Access Control Mechanism Web Service-based in, Extended Organization PKI Networks
8
作者 ZHANG Shaomin WANG Baoyi 《通讯和计算机(中英文版)》 2005年第3期14-18,共5页
关键词 WEB系统 公共信息安全 美国项目管理协会 公钥基础设施
下载PDF
基于ABAC的Web Services访问控制研究 被引量:2
9
作者 夏春涛 杨艳丽 曹利峰 《计算机应用与软件》 CSCD 北大核心 2012年第2期83-85,104,共4页
为解决Web Services访问控制问题,分析了传统访问控制模型在Web Services应用中的不足,给出了面向Web Services的基于属性的访问控制模型ABAC(Attribute Based Access Control)的定义,设计了ABAC访问控制架构,并利用可扩展的访问控制标... 为解决Web Services访问控制问题,分析了传统访问控制模型在Web Services应用中的不足,给出了面向Web Services的基于属性的访问控制模型ABAC(Attribute Based Access Control)的定义,设计了ABAC访问控制架构,并利用可扩展的访问控制标记语言XACMLe(Xtensible Access Control Markup Language)实现了细粒度的Web Services访问控制系统。系统的应用有效保护了Web Services资源。 展开更多
关键词 ABac WEB serviceS 访问控制 XacML
下载PDF
Enhanced Trust Based Access Control for Multi-Cloud Environment 被引量:1
10
作者 N.R.Rejin Paul D.Paul Raj 《Computers, Materials & Continua》 SCIE EI 2021年第12期3079-3093,共15页
Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security pla... Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distribution environments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework,trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment. 展开更多
关键词 Cloud computing TRUST access control cloud service provider cloud data user CSTA
下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
11
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD service PROVIDER Formula-Based CLOUD DATA access control Multi-Agent System and Secure Java Agent Development Framework
下载PDF
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
12
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 Oblivious Transfer(OT) access control(ac) Identity-Based Encryption(IBE) Anonymous Key Issuing(AKI)
下载PDF
Geospacial information utilized under the access control strategy
13
作者 田捷 《Journal of Chongqing University》 CAS 2007年第4期256-264,共9页
This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of aut... This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a special data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated. 展开更多
关键词 spacial technologies geospacial services access control rights expression languages
下载PDF
Web Services的访问控制研究综述 被引量:15
14
作者 许峰 林果园 黄皓 《计算机科学》 CSCD 北大核心 2005年第2期1-4,共4页
随着Web Services的发展,它本身的安全问题已经成为制约其发展的关键因素。本文主要论述了Web Ser-vices的访问控制技术的研究现状及其问题。首先,从协议层次出发讨论了Web Services的访问控制技术的研究方法。然后分别介绍了XML文档和S... 随着Web Services的发展,它本身的安全问题已经成为制约其发展的关键因素。本文主要论述了Web Ser-vices的访问控制技术的研究现状及其问题。首先,从协议层次出发讨论了Web Services的访问控制技术的研究方法。然后分别介绍了XML文档和SOAP协议的访问控制技术,以及Web Services的相关访问控制规范。最后总结全文并提出了需要进一步研究的问题。 展开更多
关键词 访问控制技术 XML文档 SOAP协议 安全问题 层次 发展 关键因素 研究综述 制约 规范
下载PDF
基于Web Service的授权访问控制方法 被引量:3
15
作者 冯翔 甘灵 +1 位作者 倪凯 张超 《计算机应用与软件》 CSCD 北大核心 2007年第10期58-59,114,共3页
授权访问控制是管理信息系统中不可缺少的重要模块,而传统的权限控制模块耦合性和复用性都有待改善。设计了一种基于Web服务的独立授权访问控制方法。该方法抽象出授权访问控制中的基本功能,通过把授权信息以五元组的形式封装到数据库... 授权访问控制是管理信息系统中不可缺少的重要模块,而传统的权限控制模块耦合性和复用性都有待改善。设计了一种基于Web服务的独立授权访问控制方法。该方法抽象出授权访问控制中的基本功能,通过把授权信息以五元组的形式封装到数据库表字段中,从而能够独立出授权访问控制功能,在这样的基础之上再将授权访问控制方法Web服务化,从而形成耦合性低、可复用性强、能被异构环境下各种平台上的各种应用方便地调用的授权访问控制模块。 展开更多
关键词 访问控制 WEB服务 数据库
下载PDF
Web Service认证体系的分析与实现 被引量:5
16
作者 张庆平 郑辉 +1 位作者 涂莑生 孙慰迟 《计算机应用》 CSCD 北大核心 2003年第4期56-59,共4页
通过对传统安全认证体系的不足之处进行分析 ,提出了基于WebService的安全认证、访问控制体系基本结构 ,在此基础上给出了有关具体实现中问题的解决方案。并进一步提出了基于面向对象方法和针对多Web站点实现单点登录的扩展结构。
关键词 WEBservice 认证体系 Internet 防火墙 访问控制 单点登录 应用程序 应用组件
下载PDF
基于ACS的SSL VPN系统的设计与实现 被引量:2
17
作者 金振训 张思荣 +3 位作者 李寒曦 潘佰林 钱杰 俞先永 《科技通报》 北大核心 2013年第7期140-142,165,共4页
随着企业信息化进程的推进,业务信息化程度的不断提高,企业对信息系统的依赖也越来越大。突破时间和空间的限制,随时使用企业内部资源已经成为工作人员迫切的需求。部署基于ACS的SSL VPN认证系统,通过VPN智能隧道和扩展RADIUS属性字段... 随着企业信息化进程的推进,业务信息化程度的不断提高,企业对信息系统的依赖也越来越大。突破时间和空间的限制,随时使用企业内部资源已经成为工作人员迫切的需求。部署基于ACS的SSL VPN认证系统,通过VPN智能隧道和扩展RADIUS属性字段的应用,解决认证系统用户访问权限控制和C/S业务系统访问局域网服务器的问题,达到无客户端VPN接入方式访问企业内局域网资源的效果。 展开更多
关键词 acs SSL VPN 访问控制 RADIUS C S
下载PDF
Web Services中基于信任的动态访问控制 被引量:5
18
作者 殷晓玲 夏启寿 王汝传 《计算机应用研究》 CSCD 北大核心 2011年第11期4331-4334,共4页
在Web Services系统中,用户行为的动态不确定性,使得现有的访问控制模型难以控制用户的恶意行为。针对这一问题,提出一种基于信任的动态访问控制模型。该模型将安全断言标记语言和可扩展的访问控制标志语言相结合,并采用了一种基于忠诚... 在Web Services系统中,用户行为的动态不确定性,使得现有的访问控制模型难以控制用户的恶意行为。针对这一问题,提出一种基于信任的动态访问控制模型。该模型将安全断言标记语言和可扩展的访问控制标志语言相结合,并采用了一种基于忠诚度的信任度计算方法。仿真结果显示,该访问控制方式能有效地遏制恶意行为,实现访问控制的动态性,具有较好的通用性、灵活性和可扩展性。 展开更多
关键词 Web serviceS 信任 忠诚度 安全断言标记语言 访问控制
下载PDF
基于PMI的Web Service访问控制方案 被引量:1
19
作者 裴浩 张基温 黄可望 《计算机工程与设计》 CSCD 北大核心 2007年第1期59-61,71,共4页
随着WebService的广泛应用,访问控制在其中的作用越来越得到体现。PMI作为权限管理设施为WebService提供了统一的授权管理方法,实现对服务资源的有效保护。介绍了WebService和PMI访问控制模型的基本功能和框架,详细论述了一种基于PMI的W... 随着WebService的广泛应用,访问控制在其中的作用越来越得到体现。PMI作为权限管理设施为WebService提供了统一的授权管理方法,实现对服务资源的有效保护。介绍了WebService和PMI访问控制模型的基本功能和框架,详细论述了一种基于PMI的WebService访问控制系统的设计方案,并对其中的消息传输、策略描述以及具体过程作了进一步的分析。 展开更多
关键词 WEB服务 简单对象访问协议 PMI 访问控制 属性证书 可扩展标记语言
下载PDF
基于角色授权的Web service访问控制模型 被引量:1
20
作者 蒙应杰 张海波 +1 位作者 杨西宁 庞博 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第2期84-88,共5页
访问控制是一种实现信息安全的有效措施,可防止对资源的未授权访问.针对目前Web服务本身的安全控制不能很好地适应企业级用户的安全需求这一问题,构造了一种基于角色授权的Web服务访问控制模型.该模型将权限同角色联系起来,根据服务... 访问控制是一种实现信息安全的有效措施,可防止对资源的未授权访问.针对目前Web服务本身的安全控制不能很好地适应企业级用户的安全需求这一问题,构造了一种基于角色授权的Web服务访问控制模型.该模型将权限同角色联系起来,根据服务特征及访问状态给用户赋予不同的角色,用户通过得到的相应角色获得访问权限,从而实现对服务本身的保护,防止未授权用户获取服务信息.另外文中还讨论了该模型实现中的几个关键问题. 展开更多
关键词 WEB服务 角色 访问控制 服务安全
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部