期刊文献+

网格访问控制及对RBAC模型扩展的研究 被引量:4

Research on grid access control and RBAC model extension
下载PDF
导出
摘要 访问控制是网格安全中的一个重要问题,其目的是要实现在异构、动态的网格环境下对资源的授权访问。讨论了现有各种访问控制技术及其应用,根据网格计算的特点,对传统的基于角色的访问控制(RBAC)方法进行了扩展,提出了一种基于角色的动态最小权限角色分配、跨域访问控制模型,达到了动态最小权限角色分配及支持跨域访问控制的目的。 Access control is one of the most important problems of grid computing. The aim of grid access control is to apply the authorization police in heteroid and dynamic environment. In this paper, current access control models in grid environments are analyzed, and the role-based access control (RBAC) model is extended according to the characteristics of grid computing. A model is developed for distributing the minimized role and supporting the dynamic access control across multi-domains.
作者 罗海 安世全
出处 《重庆邮电大学学报(自然科学版)》 2008年第6期714-718,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 高校教师专业发展研究课题(06AIJ0180031) 中国高等教育学会教育科学"十一五"规划重点研究课题
关键词 网格授权 访问控制 角色 跨域访问 grid authorization access control role across multi-domains access
  • 相关文献

参考文献9

  • 1[1]FOSTER I,KESSELMAN C,TUECKE S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of High Performance Computing Applications,2001,15(3):200-222. 被引量:1
  • 2[2]FOSTER I,KESSELMAN C,TSUDIK G,et al.A Security Architecture for Computational Grids[C/OL]// Proc.5th ACM Conference on Computer and Communications Security Conference,1998,83-92[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/security.pdf.[3] PEARLMAN L,WELCH V.FOSTER I,et a1.A Community Authorization Service for Group Collaboratio[C/OL]// Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks,2002:50-59[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/CAS_2002_Revised.pdf. 被引量:1
  • 3[4]EREIRA A L,MUPPAVARAPU V,CHUNG S M.Role-based access control for grid database services using the community authorization service[J].Dependable and Secure Computing,IEEE Transactions,2006,3(2):156-166. 被引量:1
  • 4[5]WELCH V,FOSTER I,KESSELMAN C,et al.X.509 Proxy Certificates for Dynamic Delegation[C/OL]// 3rd Annual PKI R&D Workshop,2004[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/pki04-welch-proxy-cert-final.pdf. 被引量:1
  • 5[6]LANG B,FOSTER I,SIEBENLIST F,et al.A Multipolicy Authorization Framework for Grid Security[C/OL]//in proc.NCA,2006,269-272[2008-03-06].http:www.globus.org.2006.A. 被引量:1
  • 6姚寒冰,胡和平,卢正鼎,李瑞轩.基于角色和上下文的动态网格访问控制研究[J].计算机科学,2006,33(1):41-44. 被引量:9
  • 7孙为群,单保华,张程,刘晨.一种基于角色代理的服务网格虚拟组织访问控制模型[J].计算机学报,2006,29(7):1199-1208. 被引量:16
  • 8沈群,雷咏梅,蔡红霞.RBAC及XACML在制造网格访问控制中的应用[J].计算机应用研究,2005,22(9):137-139. 被引量:1
  • 9孙鹏,杨德婷,周维,南凯,阎保平.网格环境下动态访问控制模型的研究与实现[J].计算机工程与应用,2007,43(11):132-134. 被引量:3

二级参考文献45

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2RescorlaE.SSL与TLS[M].北京:中国电力出版社,2002.. 被引量:9
  • 3Deloaeh S A, Wood M F, Sparkman C H. Multiagent Systems.Int l J Software Eng and Knowledge Eng, 2001,11 (3) : 231-258. 被引量:1
  • 4Foster I,Kesselman C,Tueeke S The Anatomy of the Grid:Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications, 2001, 15 (3) : 200-222. 被引量:1
  • 5Foster I, Kesselman C, Tuecke G,et al. A Security Architecture for Computational Grids. In: ACM Conference on Computer and Communications Security Conference, 1998. 83-91. 被引量:1
  • 6部志辉,陈渝,刘鹏.向格计算[M].北京:清华大学出版社,2002.67~80. 被引量:1
  • 7Pearlman L, Welch V, Foster I,et al. A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002. 被引量:1
  • 8Alfierl R, Cecchini R, et al. VOMS, an Authorization System for Virtual Organizations. http://gridauth. infn. it/docs/VOMSSantiago. pdf. 被引量:1
  • 9Johnston W, Mudumbai S, Thompson M. Authorization and Attribute Certificates for Widely Distributed Access Control. In:Proceedings of IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborataive Enterprises,1998. 被引量:1
  • 10Chadwick D W, Otenko A. The PERMIS X. 509 role-based privilege management infrastructure. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies,Monterey, Califorinia, USA. 2002. 被引量:1

共引文献25

同被引文献35

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部