期刊文献+

基于SAML的网格策略部署和认证机制 被引量:4

Grids Policy Deployment and Authentication Mechanism Based on SAML
下载PDF
导出
摘要 引进了安全断言标记语言技术,采用基于属性的访问控制策略和安全断言映射方法,讨论了访问控制的流程及相关的授权、认证服务,为校园网格引入了一种访问控制模型,该模型和网格中资源提供者与消费者之间的界面——Portal充分集成,提高了访问的灵活性和可靠性。 A new access control model based on security assertion markup language (SAML) is added to campus grid system. Workflow of access control and the authorization service are discussed. The attribute-based access control policy and the security assertion mapping solution are also adopted in this system. It integrates with the portal, which is in charge of the interface between resource consumers and resource providers. It shows more flexibility and reliability.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第1期170-172,175,共4页 Computer Engineering
基金 国家自然科学基金资助项目"基于计算市场模型的安全网格资源管理研究"(60273041) 国家"863"计划基金资助项目"合肥网格节点的建设及若干典型网格应用的研制"(2002AA104560)
关键词 安全断言标记语言技术 断言 基于属性的访问控制 策略 部署 Security assertion markup language(SAML) Assertion Attribute-based access control(ABAC) Policy Deployment
  • 相关文献

参考文献10

  • 1Netegrity Inc..The Security Assertions Markup Language,Defines An eXtensible Markup Language(XML)[EB/OL].2001.http://www.xml.coverp ages.org/Netegrity-SAMLWP.pdf. 被引量:1
  • 2OASIS.The OASIS Assertions and Protocol for the OASIS Security Assertion Markup Language[EB/OL].2002.http://www.oasis-open.org/committees/security. 被引量:1
  • 3The Globus Project[Z].http://www.globus.org/. 被引量:1
  • 4Al-Kahtani M A,Sandhu R.A Model for Attribute-based Userrole Assignment[C]// Proceedings of the 18th Annual Computer Security Applications Conference,Las Vegas,Nevada,USA,2002-10. 被引量:1
  • 5Ferraiolo D,Barkley J,Kuhn D.A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Trans.on Inf.Syst.Secur,1999,2(1):36-64. 被引量:1
  • 6Evans,D,Twyman A.Flexible Policy-directed Code Safety[C]//Proceedings of the IEEE Symposium on Security and Privacy,Oakland,California,1999-05. 被引量:1
  • 7Butler R,Engert D,Foster I,et al.A National-scale Authentication Infrastructure[J].IEEE Computer,2000,33(12). 被引量:1
  • 8Foster I,Kesselman C,Tsudik G,et al.A Security Architecture for Computational Grids[C]// Proc.of the 5th ACM Conference on Computer and Communications Security,1998. 被引量:1
  • 9Winsborough W H,Li N H.Protecting Sensitive Attributes in Automated Trust Negotiation[C]// Proc.of ACM Workshop on Privacy in the Electronic Society,Washington D.C.,2002-10. 被引量:1
  • 10Novotny J,Tuecke S,Welch V.An Online Credential Repository for the Grid:MyProxy[C]// Proceedings of the 10th International Symposium on High Performance Distributed Computing.IEEE Press,2001. 被引量:1

同被引文献22

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部