面向协同工作环境的多层级访问控制模型研究及应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机和网络技术的发展,传统的单机单用户工作模式已逐步发展为跨地域、跨组织的多用户协同群体工作模式。计算机支持的协同工作CSCW(Computer Supported Cooperative Work)支持地域上分散的群体共同协调与协作来完成一项任务,已广泛应用于协同产品设计、电子政务、电子商务、远程医疗和军事指挥等领域。协同工作环境群体性、交互性、分布性和协作性等特征使其面临着日益严峻的安全威胁。面向协同工作环境的访问控制技术研究具有重要的理论意义和应用价值。论文主要研究工作和创新点如下:从访问控制的角度,分析了协同环境中与访问控制策略有关的因素。在此基础上,将协同环境中的群体间协同工作模式分为:数据级协同(群体间可以共享数据资源,一个成员的行为会影响到其他成员,但各成员间可能没有共同的工作目标)、活动级协同(各成员在数据共享的基础上共同完成某个群体型活动)、流程级协同(成员间的协作具有结构化和流程化特点,协同任务可以分解为工作流中的一系列活动)和多域间的任务级协同(成员分属于不同的管理域,每个管理域按照其业务职能的不同,承担着协同工作中的不同任务)等四个层次。分析了四种模式的特点和访问控制需求。提出了基于特征码的共享数据角色访问控制模型,解决了复杂协同环境下角色和角色继承等实体关系的表达,适用于数据级的协同工作模式。引入了角色素数特征码、角色继承信息组和用户角色指派参数的概念。每个角色对应一个唯一的素数特征码;角色继承信息组由上层角色信息和下层角色信息组成,分别定义为该角色加入系统时其所有上层角色和下层角色的素数特征码乘积;用户角色指派参数为直接指派给用户的各角色素数特征码乘积。由于素数乘积的分解式是唯一的,因此,有效地简化了这些实体关系的刻画与表达。建立了面向群体协同活动的协作访问控制模型,解决了活动级协同模式下协作各方共有资源的安全保护问题。某些涉及群体共同利益的敏感活动是需要多用户参与的群体型协同活动。为了有效防止职权滥用和欺诈行为的发生,这些活动的执行权限或活动中共享数据的访问权限往往需要多用户共同参与授权决策。在特征码角色访问的基础上,将需要多用户协作决策的权限定义为协同权限,并引入权限权重概念来体现不同角色在访问相同协同权限时的信任度差异,建立了多用户共同参与决策的授权机制。通过至少2个不同用户的参与,有效保护了协同工作中共有敏感资源的安全,确保了协作各方的利益。提出了应用于工作流的柔性访问控制模型,实现了流程级协同模式下基于上下文的动态授权,支持授权流与与工作流的同步。模型通过引入角色授权策略的概念,定义了各活动执行期间各角色可被授予的权限及相应的上下文约束,实现了工作流中的动态访问控制和灵活的授权策略定义。提出了支持域间任务级协同的共享权限访问控制模型,解决了多域间协同时的资源共享与安全互操作问题。模型根据实际应用中本域对外域开放的资源和权限相对固定的情况,将域内权限分为私有权限和共享权限,避免了采用传统角色映射机制所带来的冲突和难以管理的问题。针对不同的共享权限,可以根据它的敏感性和重要性,定义对外域开放时的约束条件,包括:主体有效性约束、角色有效性约束、有效时间约束和最大数约束。实现了域间访问的最小权限原则。结合产品协同设计和民政电子政务等协同工作环境的特点,说明了本文研究的模型和方法在实际系统中的应用。
With the fast development of the technologies of computer and networks, the traditional single-user work pattern has developed to multi-user group cooperative work pattern across multiple heterogeneous domains. The objective of Computer Supported Cooperative Work (CSCW) is to support groups of multiple users across different domains communicate and cooperate to complete common tasks via computers. CSCW label has been widely applied to many applications, such as collaborative design, e-government, e-business, distance learning, remote medical system and military aommanding automatization, etc. Since CSCW is targeted towards making information and resources available to collaborators who need it, CSCW applications are facing fiercer threats than before. Access control is one of the most important security services, and aims to ensure the confidentiality and intergrity of shared information. It is a great challenge and urgent mission to develop access control approaches for CSCW. The contributions are as following:1. From the access control structure point of view, we analyse the factors related to access control policies in collaborative environments, include administrative domains, tasks, workflows, activites, roles, users and sharing information. Based on the analysis, we classify cooperative work patterns into four forms:data-level collaboration that means people certainly have to share the same resource and they may have no common objective, activity-level collaboration which means more than two users need to partipate in completing an activity, workflow-level collaboration that means the common task can be divided into several activities of workflows, and task-level collaboration among multi-domains.2. To address the expression of roles, role-hierarchies and user-role assignments in collaborative environments with hundreds of roles, thousands of users and millions of permissions, we introduce the concepts of role characteristic code and role hierarchy information, and then propose an access control model which is suitable for data-level collaboration based on these concepts. Each role is associated with a characteristic code represented by a prime number. Different roles have different characteristic codes. Since the decomposition formula of the product of prime numbers is unique. It simplifies the expression of roles, role hierarchies and user-role assignments greatly.3. A collaborative access control model is proposed for activity-level collaboration. In collaborative environments, there exist cooperative activities requiring that two or more different independent parties be responsible for their completion since they are sensitive activities. To protect the confidentiality and integrity of sensitive resources in these activities, the cooperation of different subjects is required to reduce the risk of fraud or error. Permissions related to these sensitive data can be granted to a subject only with the agreement of other subjects. If different people must access a sensitive data, then committing fraud requires a conspiracy of at least two, which raises the risk of disclosure and capture significantly. In the model, the new concept of collaborative permission is introduced. Collaborative permission refers to the permission that can be granted only with the participation of multiple parties, and is defined as a regular RBAC permission which is constrained by a collaboration constraint specifying the conditions that should be satisfied by collaborators for gaining it. Moreover, permission weight is defined to reflect the trust degree of a role in gaining a collaborative permission. The model makes it possible to define the collaboration among multiple subjects in gaining a permission and can enable effective protection of joint-owned resources of collaborators in cooperative activities.4. A flexible access control model for workflows is presented. As an important collaborative technology, workflow management system has been widely used in collaborative environments. To address access requirements of workflows, we present a flexbile access control model by the introduction of the concept of role authorization policy, which define the authorization that can be performed during activity execution and the context constraints should be satisfied. The model can support context-aware dynamic authorization and the synchronization of authorization and the execution of workflows.5. A secure interoperation model for multidomain collaborative environments based on shared permittions is presented. The model can realize secure resource sharing and interoperation among different domains. It classifies permissions of an administrative domain into two categories:private permissions that can only be accessed by subjects within the domain, and sharing permissions which can be shared by other domains. Security administrators can define constraints for a sharing permission according to its sensitivity, including subject vadility constraints, role vadility constraints, time-interval constraints and cardinality constraints. The enforcement of these constraints supports the least priviledge principle among domains.6. According to the requirements of product collaborative design and e-government, a system prototype is given to illustrate the implementation of the theory and technologies presented in this dissertation.
引文
[1].李建华,李斓,铁铃,李生红,薛质.计算机支持的协同工作[M].北京:机械工业出版社,2010.
    [2].杜栓柱.分布式协同工作环境中时间工作流建模技术研究[D].杭州:浙江大学,2004.
    [3]. Graham, GS., Denning, P.J. Protection-Principles and Practice[C]//Proceedings of Spring Joint Computer Conference.1972,40:417-429.
    [4]. Harrison, M., Ruzzo, W., Ullman, J. Protection in Operating Systems[J]. Communications of the ACM.1976,19:461-471.
    [5]. Lipton, R.J., Snyder, L. A Linear Time Algorithm for Deciding Subject Security[J]. Journal of the ACM.1977,24(3):455-464.
    [6].Sandhu, R.S. The Typed Access Matrix Model[C]//Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy. Okland, CA,1992,122-136.
    [7].Ammann, P.E., Sandhu, R.S. Implementing Transaction Control Expressions by Checking for Absense of Access Rights[C]//Proceedings of the 8th Annal Computer Security Application Conference. SanAntonio, Texas,1992,131-140.
    [8]. Bell, D.E., LaPadula, L.J. Secure Computer Systems:Mathematical Foundations. MITRE Technical Report 2547, Volume 1. National Technical Information Service [OL]. http://www.mitre.org/resources/centers/infosec/secure computers/.1973.
    [9].Biba, K.J. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153 [OL]. http://handle.dtic.mil/100.2/ADA039324/.1977.
    [10].Ferraiolo, D., Kuhn, D.R. Role-Based access control[C]//Proceedings of the 15th National Computer Security Conference.1992,554-563.
    [11]. Sandhu, R.S., Samarati, P. Access control:principle and practice[J]. Communications Magazine.1994,32(9):40-48.
    [12]. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-based access control:a multi-dimensional view [C]//Proceedings of the 10th Annual Computer Security Applications Conference.1994,32(9):54-62.
    [13].Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Gavrila, D.R., Chandramouli, R. Proposed NIST Standard for Role-based Access Control [J]. ACM Transactions on Information and System Security (TISSEC).2001,4(3):224-274.
    [14].刘启原,刘怡.数据库与信息系统的安全[M].北京:科学出版社.2000.
    [15].Bertino, E., Bonatti, P. A., Ferrari, E. TRBAC:A Temporal Role-based Access Control Model [J]. ACM Transactions on Information and System Security.2001,4 (3):58-90.
    [16]. Joshi, J.B.D. A Generalized Temporal Role Based Access Control Model for Developing Secure Systems [D]. Purdue University,2003.
    [17]. Joshi, J.B.D., Bertino, E., Latif, Usman. Generalized Temporal Role Based Access Control Model [J]. IEEE Transaction on Knowledge and Data Engineering.2005,17:4-23.
    [18].黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报.2003,14(11):1944-1954.
    [19].王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报.2005,33(9):1634-1638.
    [20].Kapadia, A., Al-muhtadi, J., Campbell, R. Secure Interoperability Using Dynamic Role Translation [C]//Proceedings of the First International Conference on Internet Computing. Las Vegas,2000, 231-238.
    [21].Shafiq, B., Joshi, J.B.D., Bertino, E. Secure Interoperation in a Multidomain Environment Employing RBAC Policies [J]. IEEE Transactions on Knowledge and Data Engineering.2005,17 (11):1557-1577.
    [22].廖振松,金海,羌卫中.一种对IRBAC2000模型的改进方法[J].华中科技大学学报(自然科学版).2005,33(z1):292-295.
    [23].吴迪.分布式环境下基于角色的互操作的访问控制技术研究[D].杭州:浙江大学,2006.
    [24]. Thomas, R.K. Team-based Access Control (TMAC):A Primitive for Applying Role-based Access Controls in Collaborative Environments[C]//Proceedings of the Second ACM Workshop on Role-based Access Control. New York, NY, USA,1997,13-19.
    [25]. Atluri,V., Huang,W.K. An authorization model for workflows[C]//Proceedings of the 5th European Symposium on Research in Computer Security. Rome,1996,44-64.
    [26]. Huang, W.K., Atluri, V. SecureFlow:A Secure Web-enabled Workflow Management System[C]//Proceedings of the 4th ACM Workshop on Role-based Access Control. Fairfax, Virginia,1999,83-94.
    [27].Wainer, J., Barthelmess, P., Kumar, A. W-RBAC:A Workflow Security Model Incorporating Controlled Overriding of Constraints [J]. International Journal of Cooperative Information Systems. 2003,12(4):455-485.
    [28].Wainer, J., Kumar A., Barthelmess, P. DW-RBAC:A Formal Security Model of Delegation and Revocation in Workflow Systems [J]. Information Systems,2007,22(3):365-384.
    [29].钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报.2000,11(6):779-784.
    [30].Ahn, G.-J. The RCL 2000 Language for Specifying Role-based Authorization Constraints [D]. George Mason University,2000.
    [31].Ahn, G.-J., Shin, M.E. Role-based Authorization Constraints Specification using Object Constraint Language[C]//Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.2001,157-162.
    [32].Crampton, J. Specifying and Enforcing Constraints in Role-based Access Control[C]//Proceedings of the eighth ACM symposium on Access control models and technologies.2003,43-50.
    [33].Sohr, K., Ahn, G.-J., Gogolla, M., et al. Specification and Validation of Authorization Constraints using UML and OCL[C]//Proceedings of 10th European Symposium on Research in Computer Security.2005,64-79.
    [34]. Ren, Y., Xiao, Z.T., Guo, S.P. An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint[C]//Proceedings of 2008 International Symposium on Electronic Commerce and Security.2008,169-174.
    [35].Neumann, G., Strembeck, M. An Approach to Engineer and Enforce Context Constraints in an RBAC Environment[C]//Proceedings of 8th ACM Symposium on Access Control Models and Technologies. Como, Italy,2003,65-79.
    [36].徐仁佐,郑红军,陈斌,马若锋,高俊鹏.基于角色和上下文的访问控制模型[J].计算机应用研究.2004,(12):140-142.
    [37].Al-Kahtani, M. A Family of Models for Rule-based User-role Assignment [D]. George Mason University,2004.
    [38].Kern, A., Walhorn, C. Rule Support for Role-based Access Control[C]//Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. Stockholm, Sweden,2005, 130-138.
    [39].李成锴,詹永照,茅兵.基于角色的CSCW系统访问控制模型[J].软件学报.2000,11(7):931-937.
    [40].Thomas, R.K., Sandhu, R.S. Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications[C]//Proceedings of the Second New Security Paradigms Workshop. Little Compton, Rhode Island,1993,138-142.
    [41].Thomas, R.K., Sandhu, R.S. Conceptual Foundations for A Model of Task-based Authorizations[C]//Proceedings of the IEEE Computer Security Foundations Workshop. New Hampshire,1994,66-79.
    [42]. Thomas, R.K., Sandhu, R.S. Task-based Authorization Controls (TBAC):A Family of Models for Active and Enterprise-oriented Authorization Management[C]//Proceedings of the IFIP WG11.3 Workshop on Database Security. Vancouver, Canada,1997:11-13.
    [43].洪帆,赵晓斐.基于任务的访问控制模型及其实现[J].华中科技大学学报(自然科学版).2002,30(1):17-19.
    [44].施教芳,李建华,薛质.一种扩展的TBAC访问控制模型研究[J].通信技术.2002,(11):95-97.
    [45].邓集波,洪帆.基于任务的工作流访问控制模型[J].软件学报.2003,14(1):76-82.
    [46].尹建伟,徐争前,冯志林.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计
    与图形学学报.2006,18(1):143-148.
    [47].Coulouris, G, Dollimore, J., Roberts, M. Role and Task-Based Access Control in the PerDiS Groupware Platform[C]//Proceedings of the 3th ACM Workshop on Role-Based Access Control. 1998,115-121.
    [48].刑光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用.2001,38(7):798-804.
    [49].Sejong Oh, Seog Park, Task-role-based Access Control Model [J]. Information Systems.2003, 28(6):533-562.
    [50]. Schmidt, K. Riding a Tiger, or Computer Supported Cooperative Work[C]//Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work (ECSCW'91). Kluwer, Dordrecht,1991,1-16.
    [51].史美林等.计算机支持的协同工作一理论与应用[M].北京:电子工业出版社,2001.
    [52].马先林,王潜平.计算机支持协同工作[J].计算机工程与应用.1995,31(6):46-49.
    [53].茅兵,杜兴.设计计算机助协同工作系统的几个关键技术[J].计算机研究与发展.1996,33(4):241-247.
    [54].董轩明,徐光佑.支持协同编著系统的协作机制研究[J].计算机科学.1996,23(3):33-36.
    [55].石立新.计算机支持的协同工作与多媒体会议系统[J].内蒙古大学学报(自然科学版).1998,29(6):835-841.
    [56].高玮玲,曹元大.协同式中医诊断专家系统的设计与实现[J].北京理工大学学报.1998,18(6):753-755.
    [57].林华,王宏典MCSDM一个面向敏捷制造的CSCW系统[J].计算机工程与科学.1998,20(2):51-55.
    [58].王魁生,李仁厚.一个基于CSCW的协同式计算机辅助设计系统[J].计算机辅助设计与图形学学报.2001,13(3):278-283.
    [59].王进,徐洗,战晓苏.作战计划协同制定系统与设计[J].计算机仿真.2002,19(4):1-4.
    [60].Anumba, C.J., Ugwu, O.O., Newnham, L., Thorpe, A. Collaborative Design of Structures Using Intelligent Agents [J]. Automation in Construction.2002,11:89-103.
    [61].Kapadia, A., Muhtadi, J.A., Campbell, R.H., Mickunas, D. IRBAC 2000:Secure Interoperability using Dynamic Role Translation. University of Illinois, Technical Report:UIUCDCS-R-2000-2162 (2000).
    [62].Shen, H.H., Dewan, P. Access Control for Collaborative Environments[C]//Proceedings of the ACM CSCW'92 Conference on Computer Supported Cooperative Work. New York,1992,51-58.
    [63].Tolone, W., Ahn, G.-J., Pai, T. Access control in collaborative systems. ACM Computing Surveys.,
    2005,37(1):29-41.
    [64]. Cera, C.D., Kim, T., Han, J.H., Regli, W.C. Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling [J]. Computer-Aided Design.2004,36(9):873-886.
    [65].李成锴,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报.2000,11(7):931-937.
    [66].朱君.角色协同中群体感知和访问控制技术研究[D].珠海:中山大学,2009.
    [67]. Edwards, W.K. Policies and Roles in Collaborative Applications [C]//Proceedings of the 1996 ACM conference on Computer supported cooperative work. Boston,1996,11-20.
    [68]. Smith, R.B., Hixon, R., Horan, B. Supporting Flexible Roles in a Shared Space[C]//Proceedings of the 1998 ACM conference on Computer supported cooperative work. Seattle, Washington,1998, 197-206.
    [69].季星.基于Web服务的分布式协同环境中角色访问控制模型研究[D].长沙:湖南大学,2007.
    [70].杜萍.基于角色的访问控制在协同设计系统中的应用研究[D].济南:山东师范大学,2007.
    [71].卞宝银,王一莉.协同环境下扩展角色访问控制模型设计与研究[J].计算机工程与设计.2010,31(4):717-719.
    [72].方萃浩,叶修梓,彭维,张引.协同环境下CAD模型的多层次动态安全访问控制[J].软件学报.2007,18(9):2295-2305.
    [73].梁策,肖田元,张林鍹.网络化制造中协同环境的访问控制技术[J].计算机集成制造系统.2007,13(1):136-140.
    [74].严巍.协同环境中动态访问控制模型的研究[D].南京:南京航空航天大学,2008.
    [75].姜洋,金天国,刘文剑.网络化协同制造环境下的混合访问控制模型[J].计算机集成制造系统.2009,15(7):1279-1285.
    [76].Georgiadis, C. K., Mavridis, I., Pangalos, G, Thomas, R. Flexible Team-based Access Control Using Contexts[C]//Proceedings of ACM Symposium on Access Control Model and Technology. Chantilly,2001,21-27.
    [77]. Alotaiby, F.T., Chen, J.X. A Model for Team-based Access Control (TMAC 2004) [C]//Proceedings of International Conference on Information Technology:Coding and Computing (ITCC'04).2004, 450.
    [78].张帅,陈晓辉,侯桂云.基于团队和任务的RBAC访问控制模型[J].通信技术.2009,42(11):119-120,187.
    [79]. Bullock, A., Benford, S. An Access Control Framework for Multi-user Collaborative Environments[C]//Proceedings of International ACM SIGGROUP conference on Supporting
    Group Work.1999,140-149.
    [80].曾隽芳,温大勇,杨一平.电子政务系统中基于角色的权限管理研究[J].计算机工程与应用.2004,22:156-160.
    [81]. Park, J.S., Sandhu, R.S., Ghanta, S. RBAC on the Web by Secure Cookies[C]//Proceedings of the IFIP WG11.3 Workshop on Database Security. London,1999,49-62.
    [82]. Park, J.S., Sandhu, R.S. Secure Cookies on the Web [J]. IEEE International Computer,2000,4(4): 36-44.
    [83].Hayton, R.J., Bacon, J.M., Moody, K. OASIS:Access Control in an Open Distributed Environment[C]//Proceedings of 1998 IEEE Symposium on Security and Privacy. Oakland, CA, 1998,3-14.
    [84]. Park, J.S., Sandhu, R.S. RBAC on the Web by Smart Certificates[C]//Proceedings of the 4th ACM Workshop on Role-based Access Control, Fairfax, VA,1999,1-9.
    [85]. Park, J.S., Ahn, G.J., Sandhu, R.S. RBAC on the Web using LDAP[C]//Proceedings of the 15th IFIP WG11.3 Working Conference on Database and Application Security, Ont., Canada,2001, 1-12.
    [86].Ni, Q., Trombetta, A., Bertino, P., Lobo, P. Privacy-aware Role Based Access Control[C]// Proceedings of the 12th ACM symposium on Access control models and technologies.2007, 41-50.
    [87].Alsulaiman, F. A., Miege, A., El Saddik, A. Threshold-based Collaborative Access Control[C]//Proceedings of International Symposium on Collaborative Technologies and Systems. 2007,45-56.
    [88].Schilit, B., Adams, N., Want, R. Context-aware Computing Applications [C]//Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA,1994,85-90.
    [89].Dey, A.K. Providing Architectural Support for Building Context-aware Applications [D]. Georgia Institute of Technology,2001.
    [90].李蕊,李仁发.上下文感知计算及系统框架综述[J].计算机研究与发展.2007,44(2):269-276.
    [91].韩伟力.分布式环境下的约束访问控制技术研究[D].杭州:浙江大学,2003.
    [92]. Han Wei-li, Zhang Jun-jing, YAO Xiao-bo. Context Sensitive Access Control Model and Implementation[C]//Proceedings of 5th International Conference on Computer and Information Technology. Shanghai,2005,751-756.
    [93].Neumann, G., Strembeck, M. An Approach to Engineer and Enforce context Constraints in an RBAC Environment[C]//Proceedings of 8th ACM Symposium on Access Control Models and Technologies. Como, Italy,2003,65-79.
    [94].Zhang, G Dynamic Context-aware Access Control for Grid Applications[D]. The State University
    of New Jersey,2003.
    [95].Zhang G, Parashar, M. Dynamic Context-aware Access Control for Grid Applications[C]// Proceedings of the 4th International Workshop on Grid Computing. Washington,2003,101-109.
    [96].Hulsebosch, R.J., Salden, A.H., Bargh, M.S., et al. Context Sensitive Access Control[C]// Proceedings of 10th ACM Symposium on Access Control Models and Technologies. Stockholm, Sweden,2005,111-119.
    [97].Bhatti, R., Bertino, E., Ghafoor, A. A Trust-based Context-aware Access Control Model for Web-services[J]. Distributed and Parallel Databases.2005,18(1):83-105.
    [98].徐仁佐,郑红军,陈斌,等.基于角色和上下文的访问控制模型[J].计算机应用研究.2004,(12):140-142.
    [99].Toninelli, A., Montanari, R., Kagal, L., et al. A Semantic Context-aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments [C]//Proceedings of 5th International Semantic Web Conference. Athens, GA,2006,473-486.
    [100].Kulkarni, D., Tripathi, A. Context-aware Role-based Access Control in Pervasive Computing System[C]//Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Estes Park, CO,2008,113-122.
    [101].姚寒冰,胡和平,李瑞轩.上下文感知的动态访问控制模型[J].计算机工程与科学.2007,29(5):1-7.
    [102]. Weeks, S. Understanding Trust Management Systems[C]//Proceedings of IEEE Sym posium on Security and Privacy. Los Alamitos, NJ,2001,94-105.
    [103].Ahn, G.-J., Sandhu, R. The RCL 2000 Language for Specifying Role-based Authorization Constraints [D]. George Mason University,2000.
    [104].Dunlop, N., Indulska, J., Raymond, K. Dynamic Conflict Detection in Policy-based Management Systems[C]//Proceedings of the 6th International Enterprise Distributed Object Computing Conference. IEEE,2002:15-26.
    [105].Dunlop, N., Indulska, J., Raymond, K. Methods for Conflict Resolution in Policy-based Management System[C]//Proceedings of the 7th International Enterprise Distributed Object Computing Conference.2003,98-109.
    [106].何再朗,田敬东,张毓森.策略冲突分析、检测及解决方案[J].兰州理工大学学报.2005,31(5):83-86.
    [107].洪帆,段素娟.多域多应用环境下的访问控制研究[J].计算机科学.2006,33(4):281-283.
    [108].张光辉,韩进,谢俊元.基于角色映射和PBNM的多域安全访问控制模型[J].计算机应用研究.2008,25(3):888-890.
    [109].张德银,刘连忠.多安全域下访问控制模型研究[J].计算机应用.2008,28(3):633-636.
    [110].Blaze, M., Feigenbaum, J., Lacy, J. Decentralized Trust Mangement[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA,1996,164-173.
    [111].Blaze, M., Feigenbaum, J., Keromytis, A.D. The KeyNote Trust Management System [OL]. http://www.cis.upenn.edu/-angelos/draft-angelos-spki-keynote.txt.gz.1998.
    [112].Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T. RFC2693:SPKI Certificate Theory [OL]. http://www.cis.ohio-state.edu/htbin/rfc/rfc2693.html.1999.
    [113]. Li, N., Mitchell, J.C., Winsborough, W.H. Design of a Role-based Trust Management Framework. [C]//Proceedings of 2002 IEEE Symposium on Security and Privacy. Berkeley, CA,2002,114-130.
    [114].Li, N., Mitchell, J.C. A Role-based Trust-management Framework[C]//Proceedings of DARPA Information Survivability Conference and Exposition. Washington, DC,2003,201-212.
    [115].朱贤,洪帆,段素娟.W多域间安全互操作的信任传播策略[J].计算机工程与科学.2005,27(6):15-17.
    [116].马晓宁,冯志勇,徐超.Web服务中跨安全域的基于信任的访问控制模型[J].计算机应用研究.2009,26(12):47514767.
    [117].Denker, G, Millen, J., Miyake, Y. Cross-domain Access Control via PKI[C]//Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY.02). Los Alamitos, CA,2002,202-205.
    [118].Power, R. Tangled Web:Tales of Digital Crime from the Shadows of Cyberspace[M]. Que/Macmillan Publishing.2000,50-120.
    [119]. Joshi, J., Ghafoor, A., Aref, W.G., Spafford, E.H. Security Models for Web-based Applications [J]. Communications of the ACM.2001,44(2):38-44.
    [120].Sandhu, R.S., Bhamidipati, V. The ARBAC97 Model for Role-Based Administration of Roles[J]. ACM Transactions on Information and System Security (TISSEC).1999,2(1):105-135.
    [121].Sandhu, R.S., Munawer, Q. The ARBAC99 Model for Administration of Roles[C]//Proceedings of the Annual Computer Se7curity Application Conference.1999:229-238.
    [122].Crampton, J., Loizou, G. Administrative Scope and Role Hierarchy Operations[C]//Proceedings of the 7th Symposium on Access Control Models and Technologies. Monterey, California,2002, 145-154.
    [123].Crampton, J., Loizou, G. Administrative Scope:A Foundation for Role-Based Administration Models [J]. ACM Transactions on Information and System Security (TISSEC).2003,6(2): 201-231.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700