期刊文献+

UCON支持的组合Web服务业务流程访问控制模型 被引量:2

A Research on UCON Enhanced Dynamic Access Control Model for the Business Process of Composite Web Services
原文传递
导出
摘要 业务流程访问控制机制是组合Web服务应用中的难点,现有的访问控制模型忽视了流程活动之间动态交互性和协同性的特点,不能适应业务流程权限的动态管理.本文提出一种使用控制支持的组合Web服务业务流程动态访问控制模型WS-BPUCON,模型通过角色和权限的分离解除了组织模型和业务流程模型的耦合关系,能够根据分布式开放网络环境中的属性信息,基于授权、职责和条件三种约束决定策略来检查访问控制决策,具有上下文感知、细粒度访问管理等特性,给出了WS-BPUCON的实施框架. Business process access control mechanism is a difficult problem in Web services composition application.The dynamic Interactivity and Coordination of business process activities have been ignored in the existing research,which can not meet the demands for the dynamic business process access control.An UCON enhanced business process dynamic access control model(WS-BPUCON) is proposed,which unbinds the coupling relationship of organization model and the process model,and provides sufficient flexibility to implement the dynamic and fine-gained access control based on the authorization,obligation and condition for business process.The paper also describes the implementation architecture of WS-BPUCON in the end.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2011年第5期408-412,共5页 Journal of Wuhan University:Natural Science Edition
基金 湖北省自然科学基金资助项目(2009CDA135) 国家教育规划课题(BCA100024) 武汉两型社会建设制度创新专项资金 华中师范大学自主科研基金专项项目"Web服务安全组合中的访问控制技术研究"
关键词 使用控制 业务流程 访问控制 组合WEB服务 usage control business process access control composite Web services
  • 相关文献

参考文献10

  • 1Stein S, Payne T, Jennings N. Flexible provisioning of web service workflows[J]. ACM Transactions on In- ternet Technology, 2008,9 (1) : 01-44. 被引量:1
  • 2Michael M, Christian W, Christoph M. Access control for cross-organizational Web service composition [J]. Journal of Information Assurance and Security, 2007,2(3) : 155-160. 被引量:1
  • 3Thomas R K, Sandhu R. Task-based authentication controls (TABC):A family of models for active and enterprise-oriented authentication management [DB/ OL]. [ 2010-01-06 ]//http : profsandhu. com/confrnc/ i fip/ i97tbac. pdf . 被引量:1
  • 4Sandhu R, Edward J, Feinsteink H, et al. Role based access control models[J]. IEEE Computer, 1996, 29 (2) :38-47. 被引量:1
  • 5Atluri V, Shin H, Vaidya J, et al. Efficient security pol- icy enforcement for the mobile environment[J]. Jour- nal of Computer Security, 2008,16(4) :439-475. 被引量:1
  • 6Wang Xin, Zhang Yanchun, Shi Hao, el al. BPEL4RBAC: An authorization specification for WS- BPEL[DB/OL]. [2010-02-01]. http:/ /www. springer- link. com/content/q2kj502mh4390574/ fulltext. pdf . 被引量:1
  • 7石伟丞,谭良,周明天.具有特征判断能力的使用控制模型研究[J].计算机科学,2010,37(6):86-90. 被引量:3
  • 8Park J, Sandhu R. The UCONABc usage control model [ J ]. ACM Transaction on Information and System Se- curity, 2004,7 ( 1 ) : 128-174. 被引量:1
  • 9Subashini S,Kavitha V. A survey on security issues in service delivery models of Web services computing[J]. Journal of Network and Computer Applications, 2011,34(1):1-11. 被引量:1
  • 10Hristo K. A survey on distributed access control sys- tems for Web business processes[J]. International Journal of Network Security, 2009,9(1) : 61-69. 被引量:1

二级参考文献6

共引文献2

同被引文献47

  • 1许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56
  • 2朱一群,李建华,张全海.一种面向Web服务的动态分级角色访问控制模型[J].上海交通大学学报,2007,41(5):783-787. 被引量:14
  • 3Park J,Sandhu R.The UCONABC Usage Control Model [J].ACM Transactions on Information and System Security,2004,7(1):128-174. 被引量:1
  • 4Sandhu R.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47. 被引量:1
  • 5廖俊国,洪帆,肖海军,张昭理.细粒度的基于角色的访问控制模型[J].计算机工程与应用,2007,43(34):138-140. 被引量:7
  • 6Kristof G. Adaptive workflow composition in service-based sys- tems[D]. Leuven: Katholieke university, 2013. 被引量:1
  • 7Roman K. Provision of service level agreements in human-en- hanced service-oriented computing environments[D]. Vienna: Vienna University of Technology, 2012. 被引量:1
  • 8Henrique J A,Jose J M. Performance evaluation of web services orchestrated with WS-BPEL4 People[J]. International Journal of Computer Networks & Communications, 2010,2 (6) : 117-134. 被引量:1
  • 9Huy T, Uwe Z, et al. Compliance in service-oriented architec- tures: a model-driven and view-based approach[J]. Information and Software Technology, 2013,54 (5) : 531-552. 被引量:1
  • 10Waldemar H, Patrick G, et al. An integrated approach for identi- ty and access management in a soa context [C] // The ACM Symposium on Access Control Models and Technologies. 2011: 21-30. 被引量:1

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部