期刊文献+

一个带有性能权衡的反射式中间件权限管理框架

A Performance Tradeoff-Enabled Permission Management Framework for Reflective Middleware
下载PDF
导出
摘要 将信任管理引入中间件可以解决分布环境下的代理和授权问题,但带来了性能损失.本义通过分析权限管理系统中使用的代理链搜索算法,在改进算法的基础上提出一种通过调节信任度阀门、牺牲一部分系统可用性来提升系统性能的方法;并给出反射式中间件上带有性能权衡的权限管理框架;框架在J2EE中间件PKUAS上得到实现,并通过实验证明了框架的可行性和有效性. Introducing the concepts of trust management into middleware helps resolving the problem of permission delegation and authorization in distributed environments. But it also takes notable performance overhead. After analyzing and improve the search algorithm of delegation chains, this paper proposes a method to trading off between system security and performance, which adapts trust level valve to decrease the request latency. Based on reflective middleware,a permission management framework of trading off is presented. This paper also presents the framework implementation on PKUAS, a J2EE-compliant middleware product and the experimental validation.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第B12期2396-2400,共5页 Acta Electronica Sinica
基金 国家重点基础研究发展计划(No.2002CB312003)、国家自然科学基金(No.60125206、60233010、90412011)、国家高技术研究发展计划(No.2004AA112070、2005AA113031)
关键词 权限管理 性能 中间件 权衡 permission management performance middleware tradeoff
  • 相关文献

参考文献11

  • 1朱磊,周明辉,刘天成,梅宏.一种面向服务的权限管理模型[J].计算机学报,2005,28(4):677-685. 被引量:29
  • 2M Blaze, J Feigenbaum, J Lacy. Decentralized trust management[ A]. Proceedings of 17th Symposium on Security and Privacy [ C ]. Oakland: IEEE Computer Society Press,1996. 164 - 173. 被引量:1
  • 3version 2, IETF RFC 2740, M Blaze, J Feigenbaum, John Ioannidis, et al. The KeyNote trust-management system[S]. 1999. 被引量:1
  • 4Gang Huang, Tiancheng Liu, Hong Mei, et al. Towards autonomic computing middleware via reflection [ A ]. In Proceedings of 28th Annual International Computer Software and Applications Conference [ C ]. Hongkong: IEEE Computer Society Press, September 28-30,2004. 122 - 127. 被引量:1
  • 5黄罡,王千祥,曹东刚,梅宏.PKUAS:一种面向领域的构件运行支撑平台[J].电子学报,2002,30(12A):1938-1942. 被引量:43
  • 6Version 1.3. Santa Clara, CA: SUN Microsystems. SUN Microsystems,Java 2 Platform Enterprise Edition Specification [ S ]. 2001. 被引量:1
  • 7Coulson G. What is reflective middleware? Distributed Systems Online [ OL ]. http ://boole. computer. org/dsonline/middleware/RMarticlel, htm ,2000. 被引量:1
  • 8IBM. Autonomic computing: IBM's perspective on the state of information technology [OL ]. http ://www. ibm. com/research/autonomic,2001. 被引量:1
  • 9Richard E, Joseph P, Craig, et al. Flexible and adaptive QoS control for distributed real-time and embedded middleware[ A ]. In Proceeding of 4th ACM/IFIP/USENIX International Middleware Conference [ C ]. Berlin: Springer-Vedag GmbH,2003. 374 - 393. 被引量:1
  • 10Gordon S Blair, Geoff Coulson, Lynne Blair, et al. Reflection, self-awareness and self-healing in OpenORB [ A]. In Proceeding of 1st Workshop on Self-Managing System [C].New York :ACM Press,Nov 18-19,2002.9 - 14. 被引量:1

二级参考文献14

  • 1梅宏,常继传,杨芙清.Software component composition based on ADL and Middleware[J].Science in China(Series F),2001,44(2):136-151. 被引量:19
  • 2Fei Y.K., Wang Z.J. A concept model of Web components. In: Proceedings of IEEE International Conference on Services Computing, Shanghai, 2004, 159~164 被引量:1
  • 3Tsalgatidou A., pilioura T. An overview of standards and related technology in Web services. Distributed and Parallel Databases, 2002, 12(2~3): 135 被引量:1
  • 4Sillitti Alberto, Vernazza Tullio, Succi Giancarlo. Service oriented programming: A new paradigm of software reuse. Lecture Notes in Computer Science 2319, 2002, 269~280 被引量:1
  • 5Blaze M., Feigenbaum J., Ioannidis John, Keromytis Angelos D. The KeyNote trust-management system. version 2. IETF RFC 2704, 1999 被引量:1
  • 6Blaze M., Feigenbaum J., Lacy J. Decentralized trust management. In: Proceedings of the 17th Symposium on Security and Privacy, Oakland, 1996, 164~173 被引量:1
  • 7Chu Y.H., Feigenbaum J., LaMacchia B. et al. Referee. Trust management for Web application. World Wide Web Journal, 1997, 2(2): 127~139 被引量:1
  • 8Li Ning-Hui, Grosof Benjamin N., Feigenbaum Joan. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 2003, 6(1): 128~171 被引量:1
  • 9Li Ning-Hui, Mitchell John C. RT. A role-based trust-management framework. In: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), Washington D.C., 2003, 201~212 被引量:1
  • 10Bacon J., Moody K., Yao W. Access control and trust in the use of widely distributed services. Middleware 2001, Lecture Notes in Computer Science 2218, 2001, 300~315 被引量:1

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部