期刊文献+

网格计算中基于RBAC的访问控制模型的研究 被引量:3

Research on Access Control Model Based on RBAC for Grid Computing
下载PDF
导出
摘要 网格安全是网格计算中的一个重要问题,网格的访问控制可以解决网格环境下的资源共享和管理问题,基于角色的访问控制是最具影响的高级访问控制模型。首先介绍了RBAC模型,分析网格中基于RBAC访问控制的模型。在网格计算中访问控制存在着多个管理域RBAC问题,给出了网格中的标准RBAC扩展,并以此建立了的网格访问控制模型。 Grid security is the main problem of grid computing. Grid access control can solve the problem of resources sharing and managing. Role-Based Access Control(RBAC) has the most important influence among all access control models. This paper introduces RBAC model and analyses access control model in grid environments. There exist multiple administrative domain problems based on RBAC in grid computing, the paper gives the RBAC standard extension in grid and sets up access control model in grid.
作者 黄刚 王汝传
机构地区 南京邮电大学
出处 《微计算机信息》 北大核心 2007年第18期130-132,157,共4页 Control & Automation
基金 国家自然科学基金(60173037 70271050) 江苏省自然科学基金 江苏省自然科学基金预研项目(BK2004218)
关键词 网格计算 访问控制 角色 RBAC 安全 grid computing access control role RBAC security
  • 相关文献

参考文献5

二级参考文献14

  • 1陈华.网格的访问控制模型[J].微机发展,2004,14(8):27-29. 被引量:5
  • 2杨赞国,高敬惠.基于C/S模式的网络信息管理系统设计与实现[J].微计算机信息,2005,21(07X):27-29. 被引量:37
  • 3宁葵,严毅,李陶深.一种基于角色访问控制的数据库安全模型[J].微机发展,2005,15(10):8-10. 被引量:4
  • 4Ramachandran J.Designing Security Architecture Solutions [M].Washington: Washington University Press, 2002.
  • 5Howard M,LeBlanc D.Writing Secure Code[M].Seattle:Microsoft Press,2002.
  • 6Sandhu R S, Samarati P. Access control: Principles and practice[J]. IEEE Communications, 1994, 32(9):40-48.
  • 7Schaad A. The Role - based Access Control System of a Euro2 pean Bank [A]. Sixth ACM Symposium on Access Control Models and Technologies[C]. Chantilly, VA USA : ACM,2001.87 - 96.
  • 8Sandhu R. Rational for the RBAC96 famil y of access control models [A]. Proceedings of the 1st ACM Workshop on Role -Based Access Control[C]. [s.l.] :ACM,1997.
  • 9Axel Kern, Andreas Schaad, Jonathan Moffett. An Administration Concept for the Enterprise Role Based Access Control Model[R]. SACMAT 2003, Como, Italy, ACM.
  • 10Sejong Oh, Seog Park. Task-Role-Based Access Control Model[J]. Information Systems, 2003, 28(6) : 533-536.

共引文献27

同被引文献19

  • 1雷浩,冯登国,周永彬,黄建.基于量化权限的门限访问控制方案[J].软件学报,2004,15(11):1680-1688. 被引量:11
  • 2洪帆,段素娟,黎成兵.基于图的委托授权模型[J].北京邮电大学学报,2005,28(6):5-7. 被引量:7
  • 3翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 4Fen'aiolo,D.,and R.Kuhn,"Role-based access controls,"In 15th NIST-NCSC National Computer Security Conference,,Baltimore, MD,October 13-16,1992,pp.554-563.
  • 5Ferraiolo,D.,J.Cugini,and R.Kuhn,“Role-Based Access Control: Features and motivations,”In Proceedings of 11th Annual Computer Security Application Conference.IEEE Computer Society Press,Los Alamitos,CA, 1995,pp.241-248.
  • 6Sandhu,R.S.,E.J.Coyne,H.L.Feinstein,and C.E. Youman,"Role- Based Access Control Models,"IEEE Computer Vol.29,No.2,IEEE Press, 1996,pp.38-47.
  • 7Shamir, A.,"How to share a secret," Communication of ACM,Vol. 22,No.11, November 1979,pp.656-715.
  • 8TRAN H,WATTERS P,HITCHENS M,et al.Trust and authorization in the grid:a recommendation model[C]// Proc of International Conference on Pervasive Services.Piscataway,NJ:IEEE,2005:433-436.
  • 9JOSANG A,GRANDISON T.Conditional inference in subjective logic[C]//Proc of the 6th International Conference on Information Fusion.Gallup,NM:University New Mexico,2003:635-642.
  • 10ZHANG Guang-sen,PARASHAR M.Dynamic context-aware access control for grid application[C]//Proc of the 4th International Workshop on Grid Computing.Washington DC:IEEE Computer Society,2003:101.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部