期刊文献+

基于CORBA的分布式访问控制 被引量:7

DISTRIBUTED ACCESS CONTROL BASED ON CORBA
下载PDF
导出
摘要 随着网络应用的发展 ,应用对安全管理的需求逐步提高 .由于安全管理最终目的是实现对资源的安全使用 ,访问控制成为安全协议中的核心问题 .目前基于角色的访问控制 (RBAC)正在因为适应于广大的商业和政府应用的需要而逐渐为人们所重视 .另一方面 ,由于异构环境的存在和异构环境下实现互操作的需求 ,CORBA凭其广泛的支持力而成为中间件规范的公认标准 .本文基于〔6〕的分析之上 ,描述 CORBA对 RBAC的方便支持 ,但是现有的 CORBA中对角色的管理有诸多不足 ,对此本文提出基于 CORBA的 RBAC实现中角色的动态管理机制 ,给出了管理框架描述 ,从而使 With the development of internet/intranet applications, security administration becomes more and more important. One of key issues of security is access control since the ultimate goal of security administration is to ensure the safe access to resources. On the one hand, RBAC (Role Based Access Control) has received much attention because it well matched commercial and government application requirements. On the other hand, CORBA has become a worldwide industry standard for constructing distributed software systems due to its support for interoperability in heterogeneous environments. This paper describes how CORBA supports RBAC conveniently, and then gives an architecture for incorporating dynamic role management into CORBA based RBAC. The improved RBAC is proved to be better suited to the distributed heterogeneous environments.
出处 《小型微型计算机系统》 CSCD 北大核心 2001年第11期1359-1363,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目 (60 0 73 0 2 9 6980 3 0 0 5 )资助
关键词 CORBA 分布式访问控制 角色管理 网络安全 计算机网络 CORBA C/S RBAC Distributed access control
  • 相关文献

参考文献7

  • 1[1]Ron Ben-Natan. CORBA on the Web[M]. McGraw-Hill, 219~228 被引量:1
  • 2[2]Eric A. Fisch,Gregory B. White. Secure computers and networks [M]. CRC Press LLC,73~82 被引量:1
  • 3[3]S.L. Chapin, W. R. Herndon, L. Notargiacoma. Security for the common object request broker architecture [C]. Proc. of 10th IEEE Conference on Computer Security Application, 1994. 21 ~30 被引量:1
  • 4[4]G. Karjoth. Authorization in CORBA security[C]. Fifth European Symposium on Research in Computer Security (ESORICS),Springer-Verlag, Lecture Notes in Computer Science 1485,1998, 143~158. 被引量:1
  • 5[5]R.S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youmen. Role based access control models[J]. IEEE Computer February 1996 29(2) 被引量:1
  • 6[6]K. Beznosov and Yi Deng. A Framework for implementing rolebased access control using CORBA security service [C]. 4th ACM Workshop on Role-based Access Control, 1999, 19~30 被引量:1
  • 7[7]R.J. Hayton, J. M. Bacon, K. Moody. Access control in an open distributed environment[C]. Proc. of IEEE Symposium on Security and Privacy, 1998. 被引量:1

同被引文献33

引证文献7

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部