期刊文献+

一种网格工作流委托授权框架模型

Delegation authorization framework model for grid workflow
在线阅读 下载PDF
导出
摘要 在动态构建服务网格虚拟组织以协同问题求解的新趋势下,提出了一种服务网格工作流委托授权模型。提出委托凭证以细粒度地表示授权决策结果,定义了委托步和委托结构体以及它们之间的依赖关系以形式化地描述流程任务之间的内在约束关系。工作流的每个原子任务被授予一个由委托凭证和激活凭证集组成的委托步,每个任务被授予一个由委托步集和激活凭证集组成的委托结构体。各自的激活凭证集分别规定了委托步之间和委托结构体之间的依赖关系。通过监控委托步和委托结构体能够细粒度地控制网格工作流授权执行过程。实例表明了该模型能满足工作流应用对安全的需求。 Under trend of dynamically constructing service grid virtual organization to solve coordinated work question,a delegation authorization model for service grid workflow is proposed.A delegation certification is proposed to express authorization decision result.Delegation step,delegation unit and their dependency relationships are defined to formally describe inherent restriction relationships between flow tasks.A delegation step consisting of a delegation certification and an enabled certification set is granted to an atom task of workflow,and its enabled certification set regulates dependency relationships between delegation steps.A delegation unit consisting of a delegation step set and an enabled certification set is granted to a task of workflow,and its enabled certification set regulates dependency relationships between delegation units.The authorization execution process of grid workflow can be controlled by above methods in a fine-grained manner.The exhibited example shows that the model satisfies security requirements of grid workflow application.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第8期23-26,共4页 Computer Engineering and Applications
基金 国家自然科学基金( the National Natural Science Foundation of China under Grant No.60573127)
关键词 网格工作流 委托授权 委托凭证 委托步 委托结构体 grid workflow delegation authorization delegation certification delegation step delegation unit
作者简介 桂劲松(1968-),男,博士生,讲师,主要研究方向为网络与信息安全、网格安全; 陈志刚(1964-),男,博士,教授,博士生导师,主要研究方向为网络及并行分布式计算; 胡玉平(1969-),男,博士后,教授,主要研究方向为网络与信息安全、数字水印; 刘立(1970-),男,博士生,讲师,主要研究方向为网格Web服务、网格安全。
  • 相关文献

参考文献8

  • 1Pearlman L,Welch V,Foster I,et al.A community authorization serviee for group collaboration[C]//IEEE 3rd International Workshop on Policies for Distributed Systems and Networks.Washington DC: IEEE Computer Society,2002:50-59.
  • 2Thompson M,Essiari A,Mudumbai S.Certificate based authorization policy in a PKI environment[J],ACM Transactions on Information and System Security(TISSEC ) ,2003,6(4) :566-588.
  • 3Ferraiolo D F,Sandhu R,Gavrila S.Proposed NIST standard for role-based access control[J].ACM Transaction on Information and System Security, 2001,4(3 ) : 224-274.
  • 4徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 5Bizri Li N.On mutually-exclusive roles and separation of duty[C]// Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS' 04 ), Washington D C, 2004: 42-51.
  • 6翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 7Zhang X W,Oh S,Sandhu R S.PBDM:a flexible delegation model in RBAC[C]//Ferrari E,Ferraiolo D.Proc of the 8th ACM Syrup on Access Control Models and Technologies.New York:ACM Press, 2003 : 149-157.
  • 8邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222

二级参考文献41

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 3Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 4Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 5Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 6Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 7Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 8Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 9Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf
  • 10Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models. IEEE Computer, 1996,29(2):38-47.

共引文献289

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部