期刊文献+

基于Web服务的分布式仿真系统的双重访问控制

Double access control model of web service based on distributed simulation system
下载PDF
导出
摘要 随着分布式仿真系统与Web服务技术的结合日益紧密,以及功能与资源分离的愈加明显,导致大量仿真资源暴露于网络中,传统、单一的访问控制模型已无法应对。为此提出了一种基于属性的针对功能和资源的双重访问控制模型,采用证书代理机制实现功能端单点登录,采用XACML实现资源端多属性的访问控制。详细描述了该模型的访问控制流程,目前已应用到虚拟采办系统中。通过对性能的分析和测试,证明了该双重访问控制模型的可用性和有效性。 As web service is taken up to develop distributed simulation system increasingly, the separation between functions and resources is obvious. This exposes many simulation resources to the wide area network, which are difficult for traditional and single access control models to deal with. A double access control based on at- tributes is proposed to achieve the access control of application function and simulation resources. The process flow of the access control is described in detail. Also, the model is realized and applied in the prototype of simulation based on acquisition system. The performance of resource access control realized on XACML is analyzed and tested, which proves the feasibility of the model.
出处 《中国工程科学》 2009年第8期72-78,共7页 Strategic Study of CAE
关键词 WEB服务安全 双重访问控制 分布式仿真系统 Web service security double access control distributed simulation system
  • 相关文献

参考文献12

  • 1Lorch Markus, Cowles Bob. Conceptual Grid Authorization Framework and Classification[ Z]. 2004. 被引量:1
  • 2Eastlake D, Reagle J, Imamura T, et al. XML Encryption Syntax and Processing[ OL]. (2002 - 12 - 10). 被引量:1
  • 3Eastlake D,Reagle J, Solo D, et al. XML - Signature Syntax and Processing[ EB/OL]. (2002 -02 - 12). 被引量:1
  • 4Ford Warwick, Hallam - Baker Phillip, Fox Barbara, et al. XML Key Management Specification (XKMS) [ EB/OL]. ( 2001 - 03 -30) [2007 -8 -30]. http://www, w3. org/TR/2001/NOTE - xkms - 20010330/. 被引量:1
  • 5Hallam- Baker PhiUip, Mysore Shivaram H. XML Key Management Specification (XKMS2.0)[ EB/OL]. (2005-06-28) [2007-8- 30 ]. http ://www. w3. org/TR/2005/REC - xkms2 - 213050628. 被引量:1
  • 6IBM, Microsoft. Security in a Web Services World: A Proposed Architecture and Roadmap [ EB/OL ]. (2002 - 04 - 07 ) [ 2007 - 8 -23]. 被引量:1
  • 7Cantor Scott, Kemp John, Philpott Rob, et al. Assertions and Protocols for the OASIS Security Assertion Markup Language[ EB/ OL]. (2005-03-15) [2007-9-3]. http://www, oasisopea. org/committees/security/. 被引量:1
  • 8Tim Moses. OASIS eXtensible Access Control Markup Language [ EB/OL ]. (2005 - 02 - 01 ) [ 2007 - 8 - 24 ]. http ://www. oasis - open. org/committees/tc_home, php? wg_abbrev = xacml. 被引量:1
  • 9傅鹤岗,李竞.基于属性的Web服务访问控制模型[J].计算机科学,2007,34(5):111-114. 被引量:11
  • 10杨怀洲,李增智.基于Web Service的安全业务体系结构的设计[J].计算机工程,2005,31(20):146-148. 被引量:6

二级参考文献29

  • 1Pierce M, Fox G, Youn C, et al.Interoperable Web Services for Computational Portals[A].Supercomputing '02[C], Baltimore,Mary-land, 2002:1-12 被引量:1
  • 2Geer D.Taking Steps to Secure Web Services[J].Computer, 2003,36(10):14-16 被引量:1
  • 3Hondo M, Nagaratnam N, Nadalin A.Securing Web Services[J].IBM Systems Journal, 2002,41(2):228-241 被引量:1
  • 4Nakamur Y, Hada S, Neyama R, et al.Towards the Integration of Web Services Security on Enterprise Environments[A].2002 Symposium on Applications and the Internet (SAINT) Workshops[C].Narar City, Nara, Japan, 2002-01:166-175 被引量:1
  • 5Naedele M.Standards for XML and Web Services Security[J].Computer,2003,36 (4):96-98 被引量:1
  • 6King S.Threats and Solutions to Web Services Security[J].Network Security, 2003, 9:8-11 被引量:1
  • 7Chang S, Chen Q, Hsu M.Management Security Policy in A Large Distributed Web Services Environment[A].COMPSAC 03[C].Dallas, USA,2003-11: 610-615 被引量:1
  • 8Malek,Harmantzis F.Security Management of Web Services[C].Network Operations and Management Symposium,2004:175-189. 被引量:1
  • 9Park N,Moon K.A Study on the XKMS-based Key Management System for Secure Global XML Web Services[C].Network Operations and Management Symposium,2004:492-495. 被引量:1
  • 10Gross,Security T.Analysis of the SAML Single Sign-on Browser/artifact Profile[C].Computer Security Applications Conference,2003:298-307. 被引量:1

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部