期刊文献+

基于安全评估的网格动态访问控制研究

Security Evaluation Based Dynamic Access Control for Grid Application
下载PDF
导出
摘要 网格具有异构、动态、多域的特点,这给网格的安全研究带来了新的挑战。网格安全基础设施(GSI)解决了网格环境下的安全认证和安全通信,但没有对访问控制问题足够重视。传统的访问控制方法仅仅从访问资源的角度来解决安全问题。主体操作方式的多样性和用户计算环境的异构性导致了网格环境的动态性和不确定性。当这种动态性对访问主体造成影响时就需要改进访问控制方法,要求访问控制系统能够动态适应网格环境的安全状态变化。针对该问题本文提出了在访问控制前加入安全评估模型(SEMFG),由该模型对访问环境和访问主体进行综合评估,监控网格环境和访问主体的行为,并用评估结果动态指导访问控制。 The emerging Grid infrastructure research presents many challenges due to its inherent heterogeneity,dynamics and multidomain characteristics. GSI,the grid security infrastructure mainly oriented to security authentication and communications,pays insufficient attention to the access control. The traditional access control methods are mainly concerned about the security problems of the provider of resources and miss the protection of the access requesters. The diversity of the operation and user heterogeneous computing environments lead to the dynamic Grid environment and uncertainty.The access control method should be improved when dynamic and uncertain changes of the grid environment affect the access requester. It should be asked to dynamically adapt to the security status changes of the grid environment. In this paper we present a security evaluation model for grid (SEMFG) in order to evaluate the security of the access environment and the requester .Evaluation results can guide the access control.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第10期16-19,共4页 Computer Engineering & Science
关键词 安全评估 动态 访问控制 网格 security evaluation;dynamic;access control;grid
  • 相关文献

参考文献12

  • 1都志辉等编著..网格计算[M].北京:清华大学出版社,2002:181.
  • 2Foster I, Kesselman C. Globus: A Meta Computing Infrastructure Toolkit[J]. International Journal of Supercomputer Applications and High Performance Computing, 1997,11(2) : 115-128. 被引量:1
  • 3Foster I,Kesselman C,Tsudik G. A Security Architecture for Computational Grids[C]// Proc of the 5th ACM Conf on Computer and Communications Security, 1998 : 83-92. 被引量:1
  • 4Alfieri R,Cecchini R,Ciaschini V,et al. VOMS,An Authorization System for Virtual Organizations[C]//Proc of the 4th European Across Grids Conf on Grid Computing, 2004:33- 40. 被引量:1
  • 5Thompson M R, Essiari A, Mudumbai S. Certificate-Based Authorization Policy in a PKI Environment[J]. ACM Trans on Information and Systems Security, 2003,6(4):566-588. 被引量:1
  • 6Chadwick D W, Otenko A. The PERMIS X. 509 Role Based Privilege Management Infrastructure[J]. Future Generation Computer Systems, 2003,19(2) : 277-289. 被引量:1
  • 7Zhang G,Parashar M. Dynamic Context-Aware Access Control for Grid Applications[C]//Proc of the 4th Int'l Workshop on Grid Computing, 2003 : 101-108. 被引量:1
  • 8Barker S, Sergot M J. Status-Based Access Control[J]. ACM Trans on Information and Systems Security, 2008, 12 (1): 265-322. 被引量:1
  • 9Tran H,Watters P, Hitchens M. Trust and Authorization in the Grid: Arecommendation Model [C]//Proc of the 2005 Int ' l Conf on Pervasive Services, 2005 : 433-436. 被引量:1
  • 10Ganesh A, Gopiath K. SPKI/SDSI Certificate Chain Discovery with Generic Constraints[-C]ffProc of the 1st Bangalre Annual Compute Conf, 2008. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部