Web服务中的关键安全技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Web服务从技术概念到实际应用的不断发展,其松散耦合、语言中立、平台无关性、可跨互联网链接应用等优点日益明显。同时,其异构性、动态性、复杂性、跨组织的松耦合性,极容易暴露其弱点和局限性。作为典型的分布式应用,Web服务面临的安全挑战包括:数据机密性、完整性、不可否认性、身份认证、访问控制、审计和安全管理等多个方面,同时还具有其自身的特点。因此业界一致认为,安全性是Web服务要成为主流技术之前必须解决的一个关键问题。而身份认证、授权与访问控制、信任建立和委托等是其中的主要安全问题。因此,对Web服务中的关键安全技术进行深入研究,既具有理论意义又具有实用价值。
     Web服务中,为完成某项任务或实现某个功能,常常有多个企业或组织共同协作,并且每个组织又都可能参与多个这种形式的协作。这些企业或组织可能采取完全不同的身份识别和认证机制,如何在一个统一的框架中兼容现存的和可能出现的多种不同认证机制以及身份凭证,在多个企业或组织之间如何映射身份凭证,是Web服务必须面对的问题。特别是,当用户需要访问多个Web服务才能完成业务处理的话,他不希望在每个Web实体上都需要提供自己的身份凭证,而是希望只登录一次,就可以访问全部相关的站点(即单点登录)。SAML(Security Assertion Markup Language,安全声明标记语言)标准和WS-Federation(Web Services Federation Language,Web服务联邦语言)规范为实现单点登录认证提供了技术支持。在分析SAML、WS-Federation和XKMS(XML Key Management Specification,XML密钥管理规范)如何实现单点登录认证机制的基础上,提出了一种基于SAML和Cookie的Web服务门户网站安全认证系统模型,实现了单一管理域和信任联盟中不同管理域之间的单点登录。模型具有灵活、可扩展、跨平台等特性。
     传统的授权是基于请求访问资源的实体的身份,或是基于直接或间接分配给这些实体的角色。但在象Web服务这样的开放环境中,资源和请求者通常位于不同的安全域中,他们之间一般没有先前建立的信任关系,互不知晓彼此的身份,身份信息(如用户名和口令、身份证书)并不适合于确定一个实体是否值得信任和授权。因此,提出了基于属性的访问控制(attribute-based access control,ABAC)机制。在ABAC中,利用相关主体、资源、环境的属性作为授权决策的基础,从而避免了在请求之前就分配权限给请求者的麻烦。对ABAC进行了扩展和形式化描述,给出了面向Web服务的基于XACML(eXtensible Access Control Markup Language,可扩展访问控制标记语言)的ABAC实现框架。为了更好地实现ABAC,还讨论了属性生存周期内的属性管理问题。
     ABAC机制因其灵活性和适用性,已广泛应用于开放和分布式的系统中,但也存在着策略管理和维护难度较大的问题以及用户敏感属性暴露问题。因为访问控制决策所需的属性可能来自不同的管理域,以不同的术语来表示和解释,即其语义可能不完全相同,从而导致了对语义互操作性的需求。这些只能用语义Web技术(尤其是Ontology技术)来解决。语义Web技术能改进面向服务的、异构环境的安全性,处理语义互操作引起的挑战。基于语义Web技术和扩展XACML,提出了一种称为具有语义的属性访问控制(Semantic-aware Attribute-Based Access Control,简称S-ABAC)方法,以解决ABAC中存在的问题。
     在Web服务环境,访问者与资源控制者通常在不同的安全域,资源控制者事先无法知晓访问者的身份,并且访问者通常是随机地访问资源,如何动态地建立信任关系便成为一个非常重要的问题。目前很多解决方案中,都假定存在一个可信的第三方权威机构,依据第三方提供的信息进行访问决策;然而,在一个开放、动态和多变的Web环境中,存在完全可信的第三方是不现实的,而需要一种合理的方法来评估第三方及合作伙伴的可信程度。自动信任协商(Automated Trust Negotiation ,ATN)机制通过属性凭证、访问控制策略的交互披露,资源的请求方和提供方可动态地建立信任关系。同时,在异构、分布式的Web服务环境,为了对资源的访问进行有效的控制,通常要使用委托(delegation)技术。分析了Web服务中的信任建立机制,提出了一种基于WS-Trust的信任建立模型和基于自动信任协商的Web服务访问控制模型。最后,基于SAML委托声明和WS-Trust规范,还提出了面向Web服务的权限委托模型和实现框架。
With the development of Web service, its merits, like the loosely coupled, language-neutral, platform-independent, linking applications within organizations across Internet, are becoming more and more important. But in the same time, some weaknesses and limitations begin to emerge due to its heterogeneity, dynamic, complexity and the loosely coupled nature across organizations. As the typical distributed applications, web services security challenges include data confidentiality (including transport data confidentiality and SOAP message confidentiality), data integrity (including transport data integrity and SOAP message integrity), non-repudiation, identity authentication, trust, access control, auditing and security management. So business circles agree conformably that its security is the key issue that must be addressed before web service becomes the mainstream technique. Identity authentication, authorization, access control, trust establishment and delegation are the main security issues. Therefore, in depth research on the key security techniques in web services not only has academic value, but also has practice meaning.
     In web services environment, it usually needs more enterprises or organizations to cooperate to accomplish a task or implement a function, and every organization may participate in many such cooperation. Because those enterprises or organizations may use different identity authentication mechanism, it is the problem that web services must face how to give attention to two or more things the existent and forthcoming authentication mechanism and how to map the identity credentials between those enterprises or organizations. Furthermore, when user must invoke many web services to accomplish business processing, he/she do not want to provide his/her identity credential to every web entity, but he/she want to authenticate only once and gain access to all federative web sites, i.e. Single sign-on (SSO). SAML (Security Assertion Markup Language) and WS-Federation provide technique support for single sign-on. By analyzing SAML, WS-Federation and XKMS (XML Key Management Specification) are how to achieve single sign-on, we present security authentication system model for web services portal website based on SAML and Cookie. This system model achieves single sign-on both in a single management domain and in a trust federation with different management domains, which has the characteristics such as flexibility, extensibility and across-platform, and so on.
     Traditionally, authorization has been based on the identity of the entity requesting access to a resource, either directly or through roles assigned to entity. However, in the open environment like web service, resources and their requestors may come from different security domains and they often will not have any preexisting relationship, so much as they do not know each other. Therefore, identity information such as user names and password, or identity certificates, is usually inadequate to determine whether or not a party should be trusted. So an attribute-based access control (ABAC) approach has been proposed. In ABAC systems, authorization decisions are based on attributes of requestor, resource and environment. ABAC avoids the need for permissions to be assigned to individual requestors before the request is made. In this paper the modeling and extending for ABAC was discussed, and the implementation architecture of ABAC for web services based on XACML was presented. In the end, the attribute management throughout their lifecycle was discussed so as to use ABAC better.
     ABAC is particularly suitable for authorization and access control in open and distributed systems due to its flexibility and applicability. However, the higher flexibility and applicability of ABAC come along with higher complexity in the specification and maintenance of the policies and the problem of sensitive attributes exposure. Because the needed attributes in access control decision may come from the different security domains, they may be annotated and interpreted with different terminology, that is to say, their semantic may be completely different. This results in the requirement for semantic interoperability, which can be settled using semantic web technologies, especially Ontology. Semantic web technologies can be used to improve security in service-oriented, open heterogeneous environments and what semantic interoperability challenge must be met. In this paper, a new semantic-aware attributed-based access control (called S-ABAC) approach was presented based on an extension of the established XACML standard and semantic web technologies so as to resolve the issues in ABAC.
     In web services environment, resources and their requestors may come from different security domains, resources controller do not know the identity of requestor in advance, and requestors visit usually the resources at random. It is an every important problem how to establish dynamically the trust relationship between them. In existing solutions, it was assumed that there is a trusty third party authority to provide information to make authorization decision, but which is not realistic in open, dynamic and phantasmagoric web services environment. So we need a reasonable method to evaluate whether or not the third party or collaborator is trusty. Automated Trust Negotiation (ATN) is a means to establish mutual trust between resource requestor and resource provider through the exchange of sensitive attribute credentials and access control policies. In heterogeneous and distribute web services environment, the delegation technology is usually needed to control the access to resources. In this paper, the trust establishment mechanism in web services was analyzed, and a trust establishment model based on WS-Trust was proposed. An ATN-based access control model for web services was also presented. And a delegation model and framework was proposed based on SAML delegation assertion and WS-Trust in the end.
引文
[1] Tsalgatidou A, Pilioura T. An Overview of Standards and Related technology in Web Services. Distributed and Parallel Databases, 2002,12(2/3):135~162
    [2] Box D,Ehnebuske D,Kakivaya G,et al. Simple Object Access Protocol (SOAP) Version 1.1. W3C Recommendation. http://www.w3.org/TR/soap/.
    [3] Chinnici R, Moreau J-J, Ryman A, et al. Web Services Description Language (WSDL) Version 2.0. W3C Recommendation. http://www.w3.org/TR/wsdl20/.
    [4] Clement L, Hately A, Claus von Riegen ,et al. Universal Description Discovery and Integration (UDDI) Version 3.0. OASIS Standard. http:// xml.coverpages.org /uddi.html
    [5] Andrews T, Curbera F, Dholakia H, et al. Business Process Execution Language for Web Services (BPEL4WS) Version 1.1. http:// www-128.ibm.com /developerworks /library/specification/ws-bpel/
    [6] Mark O’Neill著.冉晓旻,郭文伟译. Web服务安全技术与原理.北京:清华大学出版社,2003.
    [7] IBM Corporation and Microsoft Corporation. Security in a Web Services World: A Proposed Architecture and Roadmap, Version 1.0, April 2002. http://www-106.ibm.com/developerworks/library/ws-secmap/.
    [8] Bob A, Giovanni D. Web Services Security (WS-Security) Version 1.0, April 2002. http://msdn.microsoft.com/ws/2002/04/Security/.
    [9] Donald E, Joseph R. XML-Signature Syntax and Processing. W3C Recommendation, February 2002. http://www.w3c.org/TR/xmldsig-core/.
    [10] Donald E, Joseph R. XML-Encryption Syntax and Processing. W3C Recommendation, March 2002. http://www.w3c.org/TR/xmlenc-core/.
    [11] Damian Ei, Sabrina De Capitani di Vimercati, Paraboschi S, et al. A Fine-Grained Access Control System for XML Documents. ACM Transactions on Information and System Security (TISSEC), 2002, 5(2):169~202.
    [12] Meng X F, Luo D F, Ou J B. An extended Role Based Access Control Method for XML Documents. Wuhan University Journal of Netural Sciences, 2004,9(5):740~744.
    [13] Damiani E, Sabrina De Capitani di Vimercati, Paraboschi S, et al. Fine grained access control for SOAP e-services. In Proceedings of 10th International Conference on World Wide Web (WWW), Hong Kong, 2001, 504~513.
    [14] Bajaj S, Box D, Chappell D, et al. Web Services Policy Framework (WS-Policy) ,Version 1.2, April 2006. http://www.w3.org/Submission/WS-Policy/.
    [15] Anderson S, Bohren J, Boubez T, et al. Web Services Trust Language (WS-Trust), Version 1.1, May 2004. http://msdn.microsoft.com/ws/2004/04/ws-trust/.
    [16] Anderson S, Bohren J, Boubez T, et al.Web Services Secure Conversation Language (WS-SecureConversation). http://www-128.ibm.com/developerworks/library/ specification/ws-secon/
    [17] Bajaj S, Giovanni D-L, Dixon B, et al. Web Services Federation Language (WS-Federation) Version 1.0. July 2003. http://www-128.ibm.com/developerworks/ library/specification/ws-fed/.
    [18] Adams C, Farrell S. Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510.1999. http://www.ietf.org/html.charters/ pkix-charter.html
    [19] Farrell S, Housley R. An Internet Attribute Certificate profile for authorization RFC3281, 2002. http://community.roxen.com/developers/idocs/rfc/rfc3281.html
    [20] Reiner K. Research and Design Issues in Access Control for Network Services on the Web. In: Hamid R. Arabnia, Youngsong Mun (Eds.): Proceedings of the International Conference on Internet Computing, IC'2002, Las Vegas, Nevada, USA, 2002. 542~548
    [21] Juha K. Cross-Organisational User Management with Shibboleth. http://www.cs.helsinki.fi/u/lamsal/teaching/autumn2003/student_slides/juha_kervinen_slides.pdf
    [22] Ferraiolo D, Sandhu R. Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security (TISSEC).2001,4(3):224~274
    [23] Chadwick D W, Otenko A. The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Monterey, California, 2002. 135~140
    [24] Chadwick D W, Otenko A, Ball E. Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing, March-April 2003. 62~69
    [25] Bhatti E, Shafiq B, Bertino E, et al. X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control. ACM Transactions on Information and System Security (TISSEC), 2005,8(4):388~423
    [26] Wonohoesodo R, Tari Z. Role-Based Access Control System for Web Services. In: Proceedings of the 2004 IEEE International Conference on Services Computing (SCC’04), Shanghai, China, 2004. 49~56.
    [27] Xu F, Lin G Y, Huang H, et al. Role-Based Access Control System for Web Services. In: Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), Wuhan, 2004, 357~362
    [28] Bhatti R, Bertino E, Ghafoor A. A Trust-based Context-Aware Access Control Model for Web Services. In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), San Diego, California, USA, 2004. 184~191
    [29] Xu F, Xie J, Huang H, et al. Context-Aware Role-Based Access Control Model for Web Services. Lecture Notes in Computer Science 3252, 2004, 430~436
    [30] Priebe T, Fernandez E B, Mehlau J I. A Pattern System for Access Control. In: Proceedings of the 18th Annual IFIP WG11.3 Working Conference on Data and Application Security, Sitges, Spain, 2004. 235~249
    [31] Winsborough W H, Jacobs J. Automated Trust Negotiation in Attribute-based Access Control. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), Washington D.C.USA, April 2003.252~258
    [32] Yuan E, Tong J. Attribute Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE Conference on Web Services (ICWS’05), Orlando Florida, USA, 2005. 561~569
    [33] Liu M, Guo H Q, Su J D. An Attribute and Role-Based Access Control Model for Web Services. In proceedings of the 4th International Conference on Machine Learning and Cybernetics, Guangzhou, 2005. 1302~1306.
    [34] Microsoft .NET Passport Review Guide.http://www.passport.com/.
    [35] Liberty Alliance Project. Liberty Architecture Overview V1.1. November 2002. http://www.oasis-open.org/committees/documrnts.php?wg_abbrev=security
    [36] Shibboleth Project.http://shibboleth.internet2.edu/
    [37] VOMS Architecture v1.1. http://grid-auth.infn.it/docs/VOMS-v1_1.pdf. May 2002.
    [38] Pearlman L, Welch V, Foster I, et al. A Community Authorization Services for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks,2002.50~59
    [39] OASIS Standard. Security Assertion Markup Language (SAML) V1.1, October, 2003. http://www.oasis-open.org/committees/security/docs/cs-sstc-core-01.pdf.
    [40] OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard. 14 March, 2005. http://docs.oasis-open.org/security/saml/v2.0/
    [41] OASIS Standard. eXtensible Access Control Markup Language (XACML) Version 1.0. February, 2003. http://www.oasis-open.org/committees/xacml
    [42] OASIS eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard. February, 2005. http://docs.oasis-open.org/xacml/access_control-xacml-2.0-core-spec-os.pdf
    [43] W3C Recommendation. XML Key Management Specification (XKMS) Version 2.0, 2003. http://www.w3c.org/TR/xkms2.
    [44]许峰,林果园,黄皓. Web Services的访问控制研究综述.计算机科学, 2005, 32(2):1~4.
    [45]岳昆,王晓玲,周傲英. Web服务核心支撑技术:研究综述.软件学报, 2004,15(3):428~442.
    [46]韩涛,郭荷清. Web服务安全模型的研究与实现.计算机工程, 2006,32(10):130~132.
    [47]毛捍东,张维明.一个基于Web服务的单点登录系统.计算机工程与应用, 2004,33(24):18~20.
    [48] SSL 3.0 Specification. http://wp.netscape.com/eng/ssl3/
    [49] Carlisle Adams & Steve Lloyd著,冯登国等译. IPSec:新一代网络安全标准.北京:人民邮电出版社,2001
    [50] (美)Ben Galbraith,Whitney Hankison等著,吴旭,王黎译. Web服务安全性高级编程.北京:清华大学出版社,2003.
    [51] Park J, Sandhu R. Cookies on the Web. IEEE Internet Computing,2000,4(4): 36~45.
    [52]马亚娜,钱焕延,孙亚民. Cookie在web认证中的应用研究.小型微型计算机系统, 2004,25(2):207~210.
    [53] Chamberlin N A. Brief Overview of Single Sign-On Technology. Government Information Technology Issue 2000:A View to the Future,2000,1:3~7
    [54] IBM Tivoli Federated Identity Management and Secure Web Services. http://www.rv-nrw.de/Koop/TivoliIdMgr/FederatedIdentity_technicalWP.pdf, 2002.
    [55] Maler E, Mishra P. Bindings and Profiles for the OASIS Security Assertion Markup Language (SAML) V1.1. OASIS, September 2003. http://www.oasis-open.org/ committees/security/
    [56] Thomas Gross. Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. In: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, 2003. 298~307
    [57] IBM, Microsoft, VeriSign. Web Services Federation Language: Active Requestor Profile.July 2003. http://www-128.ibm.com/developerworks/library/specification/ ws-fedworld/
    [58] IBM, Microsoft, VeriSign. Web Services Federation Language: Passive Requestor Profile. July 2003. http://www-128.ibm.com/developerworks/library/specification/ ws-fedworld/
    [59] BEA WebLogic Web SSO(SAML). http://dev2dev.bea.com.cn/techdoc/ 200507499.html
    [60] RSA Sign-On Manager. http://www.rsasecurity.com.cn/prod_signon.asp
    [61] Sun Java System Access Manager. http://www.sun.com/software/products/access_mgr/
    [62] Rivest R L, Lampson B. SDSI:A Simple Distributed Security Infrastructure. 1996. http://research.microsoft.com/Lampson/59-SDSI/WebPage.html.
    [63] Ellison C, Frantz B, Lampson B, et al. SPKI Certificate Theory. RFC 2693, 1999. http://www.ietf.org/rfc/rfc2693.txt
    [64] Li N H, Mitchell J C. RT: A Role-based Trust-management Framework. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C., IEEE Computer Society Press, 2003. 201~212
    [65] Seamons K E, Winslett M, Yu T, et al. Requirements for Policy Languages for Trust Negotiation. In: Proceedings of the 3rd Intelnet Workshop on Policies for Distributed Systems and Networks (POLICY 2002). Washington: IEEE Computer Society Press, 2002. 68~79.
    [66] Anderson A, Lokhart H. SAML 2.0 profile of XACML 2.0, OASIS Standard. February, 2005. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-saml-profile-spec-os.pdf
    [67] Apache Axis Project Home Page. http://ws.apache.org
    [68] Sun XACML PDP. http://sunxacml.sourceforge.net/.
    [69] Berners-Lee T, Hander J, Lassila O. The Semantic Web. Scientific American, May 2001
    [70] Yague M I, Mana A, Lopez J. et al. Applying the Semantic Web Layers to Access Control. In: Proceedings of the 14 International Workshops on Database and Expert Systems Applications (DEXA’03). 2003. 622~626
    [71] Persiano P, Visconti I. An Anonymous Credential System and a Privacy-Aware PKI. In: Proceedings of the 8th Australasian Conference on Information Security and Privacy. 2003. 27~38
    [72] Winsborough W H, Jacobs J. Automated Trust Negotiation in Attribute-based Access Control. Proceesings of the DARPA Information Survivability Conference and Exposition (DISCEX’03). 2003.252~258
    [73] Studer R, Volz R, Stumme G, et al. Semantic Web-State of the Art and Future Directions. Kunstliche Intelligenz 3(special Issue on the Semantic Web),2003.5~9
    [74] Klyne G, Carroll J J. Resource Description Framework (RDF): Concepts and Abstract Syntax. W3C Recommendation. February 2004. http://www.w3.org/TR /rdf-concepts/.
    [75] Beckett D. RDF/XML Syntax Specification. W3 Consortium Recommendation. February 2004. http://www.w3.org/TR/rdf-syntax-grammar/.
    [76] Brickley D, Guha R V. RDF Vocabulary DescrIDPtion Language 1.0: RDF Schema. W3 Consortium Recommendation. February 2004. http://www.w3.org/TR/rdf-schema/.
    [77]邓志鸿,唐世渭,张铭等. Ontology研究综述.北京大学学报(自然科学版), 2002, 38(5): 730~728
    [78] Priebe T, Dobmeier W, Kamprath N. Supporting Attribute-based Access Control with Ontologies. In: Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES '06), Vienna, Austria. April 20, 2006. 465~472
    [79] Yague M I, Troya J M. A Semantic Approach for Access Control in Web Services. In Euroweb 2002 Conference. The Web and the GRID: from e-science to e-business, British Computer Society, 2002. 483~494
    [80] Shields B, Molloy O, Lyons G, et al. Using Semantic Rules to Determine Access Control for Web Services. In: Proceedings of the 15th International Conference on World Wide Web,Edinburgh, Scotland, 2006. ACM Press, New York, NY, 913~914
    [81] Battle S, Bernstein A, Boley H. Semantic Web Services Framework Overview. DRAFT Version 1.1. May 2005. http://www.daml.org/services/swsf/1.1/ overview/
    [82] Agarwal S, Sprick B, Wortmann S. Credential Based Access Control for Semantic Web Services. In AAAI Spring Symposium– Semantic Web Services, 2004. 563~572
    [83] Agarwal S, Sprick B, Wortmann S. Access control for semantic web services. In: Proceedings of IEEE International Conference on Web Services (ICWS'04), San Diego, California, USA, 2004. 770~773
    [84] Kagal L, Paolucci M, Srinivasan N. Authorization and Privacy for Semantic Web Services. In: Proceedings of the First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, 2004. 50~56
    [85] Aitken S, Bradshaw J, Dalton J, et al. KAoS Policy Management for Semantic Web Services. IEEE Intelligent Systems, 2004,19(4):32~41
    [86] OWL Web Ontology Language Overview. World Wide Web Consortium, February 2004. http://www.w3.org/TR/2004/REC-owl-features-20040210/
    [87] The OWL Services Coalition. OWL-S: Semantic Markup for Web Services.
    [88] SWRL: A Semantic Web Rule Language Combining OWL and RuleML. Draft Version 0.7,21 December 2004. http://www.daml.org/services/owl-s/1.0/owl-s.html
    [89] Uszok A, Bradshaw J, JeffersR, et al. KAoS Policy and Domain Services: Toward a DescrIDPtion-Logic Approach to Policy Representation, Deconfliction, and Enforcement. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Network, Italy, 2003. 93~98
    [90] Kagal L, Finin T, Joshi A. A Policy Based Approach to Security on the Semantic Web. In: Proceedings of the 2nd International Semantic Web Conference (ISWC), LNCS, vol 2870, Springer, 2003. 50~56
    [91] SPARQL Query Language for RDF. World Wide Web Consortium, February 2005. http://www.w3.org/TR/2005/WD-rdf-sqarql-query-20050217/
    [92] Kini A. Trust in electronic commerce: definition and theoretical considerations. In: Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences. USA: IEEE Computer Society, 1998. 51~61
    [93] Wang Y, Vassileva J. Trust and reputation model in peer-to-peer networks. In: Proceedings of the Third International Conference on Peer-to-Peer Computing. Washington: IEEE Computer Society, 2003. 150~157
    [94] J?sang A, Keser C, Dimitrakos T. Can we manage trust? In: Herrmann P, Issarny V, Shiu S eds. Proceedings of the Third International Conference on Trust Management (iTrust). Berlin: Springer-Verlag, 2005. 93~107
    [95] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland: IEEE Computer Society Press, 1996. 164~173
    [96]徐锋,吕建.Web安全中的信任管理研究与进展.软件学报,2002,13(11):2057~2064
    [97] Johnson W, Mudumbai S, Thompson M. Authorization and attribute certificates for widely distributed access control. In: 15th IEEE International Conference on Data Engineering, San Diego, CA, 1998.158~161
    [98] Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation. In: DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000. 88~102
    [99] Seamons K E, Winslett M, Yu T. Limiting the disclosure of access control policies during automated trust negotiation. In: Network and Distributed System Security Symp (NDSS 2001). San Diego,California,USA. IEEE Computer Society Press, 2001. 109~124
    [100] Winsborough W H, Li N H. Protecting sensitive attributes in automated trust negotiation. In: Proc. of the ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2002. 41~51
    [101]李建欣,怀进鹏,李先贤.自动信任协商研究.软件学报,2006,17(1):124~133
    [102] Winslett M, Yu T, Seamons K E, et al. Negotiating Trust on the Web. IEEE Internet Computing, 2002,6(6): 30~37
    [103] Seamons K E, Winslett M, Yu T. Limiting the disclosure of access control policies during automated trust negotiation. In: Proceedings of the Network and Distributed System Security Symposium. Internet Society Press, 2001. 109~124
    [104] Yu T, Ma X, Winslett M. PRUNES: An efficient and complete strategy for trust negotiation over the Internet. In: Proceedings of the 7th ACM Conf. on Computer and communications Security. New York: ACM Press, 2000.210~219
    [105] Seamons K E, Winslett M, Yu T, et al. Requirements for policy languages for trust negotiation. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey. Washington: IEEE Computer Society Press, 2002. 68~79
    [106] Ryutov T, Zhou L, Neuman C, et al. Adaptive Trust Negotiation and Access Control. In: Proceedings of the tenth ACM symposium on Access control models and technologies, 2005. 139~146
    [107] Seamons K E, Chan T, Child E, et al. Negotiating Trust in Dynamic Coalitions. In: Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE press,2003.49~56
    [108] Olson L, Winslett M, Tonti G. Trust Negotiation as an Authorization Service for Web Services. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006.30~40
    [109] Lee A. Traust: A Trust Negatiation Based Authorization Service for Open Systems. M.S. thesis, University of Illinois at Urbaba-Champaign, August 2005.
    [110] Navarro G, Fironzabadi B, Rissanen E, et al. Constrained Delegation in XML-based Access Control and Digital Rights Management Standards. In: Proceedings of Communication, Network, and Information Security (CNIS’03), 2003. 271~276
    [111] Canovas D, Gomez A. Delegation in Distributed Systems: Challenges and Open Issues. In: Proceedings of 14th IEEE International Workshop on Database and Expert Systems Applications (DEXA’03), 2003. 499~503
    [112] Bandmann O, Dam M, Firozbabadi B S. Constrained Delegation. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002. 131~140
    [113] Na S, Cheon S. Role Delegation in Role-Based Access Control. In Proceedings of the fifth ACM Workshop on Role-Based Access Control, 2000. 357~362
    [114] Ahn G, Mohan B. Secure Information Sharing Using Role-based Delegation. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), 2004. 810~819
    [115] Ahsant M, Basney J, Mulmo O. Grid Delegation Protocol. In: Proceedings of the Workshop on Grid Security Practice and Experience, Oxford, UK, 2004. 81~91
    [116] Welch V, Faster I, Kesselman C, et al. X.509 Proxy Certificates for Dynamic Delegation. In 3rd Annual PKI R&D Workshop, 2004.
    [117] Wang J, Vecchio D, Humphrey M. Extending the Security Assertion Markup Language to Support Delegation for Web Services and Grid Services. In: Proceedings of the IEEE International Conference on Web Services (ICWS’05), IEEE Computer Society, 2005. 67~74
    [118] Gomi H, Hatakeyama M, Hosono S, et al. A Delegation Framework for Federated Identity Management. In Proceedings of the 2005 Workshop on Digital Identity Management (DIM’05), 2005. 94~103
    [119] Web Services Security: SAML Token Profile.2004. http://www.oasis-open.org/ committees/download.php/6271/WSS-SAML-10.pdf
    [120] Microsoft Web Services Enhancements. http://msdn.microsoft.com/webservices/ building/wse/default.aspx
    [121] Shyamasundar R K, Patil V. ROADS: Role-based Authorization and Delegation System. In: Proceedings of the International Conference on Computational & Experimental Engineering and Sciences (ICCES-03), Corfu, Greece, 2003.121~128
    [122] Ao X H, Minsky N H. Regulated delegation in distributed systems. In: Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and and Networks (POLICY'06), 2006. IEEE Computer Society, 215~226.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700