期刊文献+

海洋环境云平台访问控制系统研究 被引量:1

Research on access control system of ocean environment cloud platform
下载PDF
导出
摘要 海洋环境云平台是一个多域多级别的云系统,包含的资源安全级别多,资源归属复杂,海洋云平台的用户来自于不同的研究机构,用户类型多。基于以上需求本文提出多级跨域角色访问控制模型,利用角色映射机制解决跨域跨级的访问控制问题。跨域角色访问控制模型不但能够保证不同域之间用户访问资源的控制,同时域内的角色映射可以将前端用户与服务端用户进行分离,不用为每一位前端用户在云平台上创建一个对应的用户,能够有效地降低平台用户的管理难度。本文搭建了海洋环境信息云平台访问控制系统,并对系统的安全性和效率进行了验证。 The cloud of ocean information is a cloud system which includes multi-domains and muhi-level security. The resources contained in it have muhi-levels security and belonging to different user. The user of this cloud platform are from different research institutions which of many different types. Based on those requirements, this paper proposes a multi-level cross-domain role-based access control model to solve the problems. The cross-domain access control role model not only to ensure control of user access to resources between different domains but also segregation between the front-end user and platform user by the way of role mapping. Through this way, it is not necessary to create a corresponding user on cloud platform for every front-end user, which can effectively reduce the difficulty of managing the platform users.
出处 《微型机与应用》 2015年第7期9-12,23,共5页 Microcomputer & Its Applications
关键词 海洋环境信息云平台 角色映射 访问控制模型 ocean environment information cloud platform role mapping access control model
  • 相关文献

参考文献8

二级参考文献33

  • 1沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 2韩若飞,汪厚祥.基于任务-角色的访问控制模型研究[J].计算机工程与设计,2007,28(4):800-802. 被引量:33
  • 3王庆波,金滓,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2009.
  • 4O'MALLEY O, ZHANG K, RADIA S, et al. Hadoop Security Design[EB/OL]. (2009-1 O- 11) [2012-04-15]. http : //www.issues.apache.org/jira/browse/HADOOP-4487.
  • 5BECHERER A. Hadoop Security Design Just Add Kerberos? Really?[EB/OL]. (2011-04-20) [2012-04-18]. http: //www. isecpartners.com.
  • 6The Apache Software Foundation. Service Level Authorization Guide[EB/OL]. (2012-02-14) [2012-04- i 8]. http : //hadoop. apache.org/common/docs/stable/service_level_auth.html.
  • 7皮丽华.不可盲崇拜Hadoop警惕安全性漏洞[EB/OL].(2011-12-09)[2012-04-15].http://tech.itl68com/a2011/1208/1285/000001285780.shtml.
  • 8Armbrust M, Fox A,Griffith R,et al. Above the clouds: Aberkeley view of cloud computing [R]. Technical report UCB/EECS-2009-28, Electrical Engineering and Computer Sciences,University of California at Berkeley. Berkeley, USA, 2009.
  • 9胡大晶.操作系统访问控制研究与实现[D].合肥:中国科学技术大学,2009.
  • 10David Chisnali. The definitive guide to the Xen hypervisor[M]. Prentic Hall, 2007.

共引文献127

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部