期刊文献+

基于RBAC的多等级移动Agent系统访问控制机制 被引量:1

Role-Based Access Control for Multi-Grade Mobile Agent System
下载PDF
导出
摘要 针对Agent系统网络结构的多等级特点,在RBAC96模型的基础上,提出了一种基于角色的多等级Agent系统访问控制机制。通过制定多等级访问规则,划分Agent服务器中资源信息的属性和访问权限的级别,保证了Agent系统的多等级性;通过认证机制对来访Agent的身份、等级进行认证,保证了Agent系统的安全;通过角色作为中介配置用户和权限,提高了权限配置的效率和Agent系统灵活性。该机制算法已由脚本语言python编程实现。
出处 《计算机系统应用》 2009年第7期23-27,共5页 Computer Systems & Applications
基金 国防预研项目(513060401)
  • 相关文献

参考文献8

二级参考文献65

  • 1[1]Bertino E,Ferrari E,Atluri V.An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems[J].ACM Transactions on Information Systems Security, 1999; 1 (1)
  • 2[2]Castano S,Casati F,Fugini M.Managing Workflow Authorization Constraints through Active Database Technologh[J].Information Systems Frontiers, 2001; 3 (3)
  • 3[3]Shengli Wu,Amit Sheth John Miller,Zongwei Luo. Authorization and Access Control of Application Data in Workflow Systems[J].Intelligent Information Systems,2002-01:71~94
  • 4[4]S Jajodia,P Samarati,M L Sapino et al.Subrahmanian,Flexible Support for Multiple Access Control Policies[J].ACM Transactions on Database Systems,2001 ;26(2) :214~260
  • 5[5]P Bonatti,S de Capitani di,P Samarati. A Modular Approach to Composing Access Control Policies[C].In:Proceedings of the 7th ACM conference on Computer and communications security,Athens Greece,ACM Press,2000-11:164~173
  • 6[6]T Y C Woo,S S Lam. Authorizations in distributed systems:A new approach[J].Journal of Computer Security, 1993;2 (2,3): 107~136
  • 7[7]P Samarati,M K Reiter,S Jajodia. An Authorization Model for a Public Key Management Service[J].ACM Transactions on Information and System Security(TISSEC) ,2001 ;4(4) :453~482
  • 8[8]Bertino E,Ferrari E.Administration Policies in a Multipolicy Authorization System[C].In:Proc 11th IFIP Working Conference on Database Security ,Lake Tahoe(CA), 1997-08:15~26
  • 9[3]IEEE Draft P1003. 1e/2c IEEE Standard Department,1997
  • 10[4]Grunbacher A. Posix Access Control Lists on Linux,SuSE Labs,linux AG

共引文献44

同被引文献5

  • 1Stallings W. Cryptography and Network Security Principles and Pracfices.北京:电子工业出版社,2006.
  • 2Van Rossum (2 An Introduction to Python. Network Theory Ltd 2OO3,4.
  • 3http://pydes.sourceforge.net.
  • 4Li AN, Zhao ZM. Research and design of security mechanism for multi-grade Agent system. The llth IEEE International Conference on Communication Technology Proceedings. 2008.777-780.
  • 5李爱宁,赵泽茂.分布式网络中智能代理的安全迁移机制[J].计算机工程与科学,2009,31(1):101-102. 被引量:2

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部