期刊文献+

云计算环境中基于对象和用户的角色访问控制模型 被引量:10

Role-based Access Control of User and Object in Clouding Computing Environment
在线阅读 下载PDF
导出
摘要 针对云计算环境中资源按需访问的特点以及不同资源不同用户访问控制的特殊性,基于基本角色访问控制模型(role-based access control,RBAC),提出一种基于对象和用户的角色访问控制模型OURBAC(object-and-user based on RBAC);并设计了具体的用户访问权限判定规则。以实际实现应用为背景,设计了OURBAC的具体实现流程,对算法的安全性进行了分析,表明本算法使云资源访问控制得以进一步细化,能明显减少系统中角色数量,有效的提高了系统运行效率及安全性。 In the cloud computing environment,access control is on-demand and it requires users under control when accessing different resources.Based on the theory of role-based access control (RBAC),OURBAC is presented according to the characteristic.It is a new access control model based on role access of users and objects.Access permission rules of authority judgment for specific user are also designed.The algorithm used in OURBAC model made the cloud resource access control be further refined,and significantly reduced the number of roles in the system to improving the operation system efficiency and safety effectively.Based on the actual implementation of application,the implementation process of OURBAC model is designed and the security of the algorithm is analyzed.
出处 《科学技术与工程》 北大核心 2014年第29期229-233,共5页 Science Technology and Engineering
基金 国家自然科学基金(61163025) 自然科学基金面上项目(61271275)资助
关键词 云计算 访问控制 基于对象和用户 权限规则 cloud computing access control object-and-user based permission rule
  • 相关文献

参考文献18

  • 1林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:322
  • 2何康.云计算环境中基于访问控制模型的用户效用安全优化研究.长沙:湖南大学,2012.
  • 3岳小均.基于云计算的统一身体认证与管理平台研究与实现.成都:电子科技大学,2008.
  • 4李唯冠,赵逢禹.带属性策略的RBAC权限访问控制模型[J].小型微型计算机系统,2013,34(2):328-331. 被引量:22
  • 5沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:88
  • 6李阳.云计算中数据访问控制方法的研究.南京:南京邮电大学,2013.
  • 7Lapadula L J,Bell D E.Source computer system:a mathematical model.MTR-2547,1973.
  • 8Biba K.Integrity considerations for secure computer system.U.S.Air Force Electronic Systems Division,1977.
  • 9Joshi J B D,Bertion E,Ghafoor A.Hybrid role hierarchy for generalized temporal role based access control model.Proceedings of the Annual International Computer Software and Applications Conference.Oxford,England,2002:951-956.
  • 10Joshi J B D,Bertion E,Latif U,et al.A generalized temporal rolebased access control model.IEEE Transaction on Knowledge and Data Engineering,2005 ;17 (1):4-23.

二级参考文献155

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 4Wikipedia. Cloud computing [ EB/OL ]. (2007-03-03) [ 2008-12- 20]. http ://en. wikipedia, org/wiki/Cloud computing.
  • 5Wikipedia. John McCarthy ( computer scientist) [ EB/OL]. (2008- 10-07) [2008-12-10]. http://en. wikipcdia, org/wiki/John_McCarthy_(computer_scientist).
  • 6IBM, C, oogle and IBM announced university initiative to address intemetscale computing challenges [EB/OL]. (2007-10-08) [2008-10-15]. http ://www-03. ibm. com/press/us/en/pressrelease/22414. wss.
  • 7HEWITT C. ORGs for scalable, robust privacy-friendly client cloud computing [ J]. IEEE Intemet Computing, 2008,12 (5) :96- 99.
  • 8WANG Li-zhe, TAO Jie, KUNZE M. Scientific cloud computing: early definition and experience[ C ]//Proc of the 10th IEEE International Conference on High Performance Computing and Communications. 2008:825- 830.
  • 9BUYYA R, YEO C S, VENUGOPAL S. Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities[ C]//Proc of the 10th IEEE International Conference on High Performance Computing and Communications. 2008:5- 13.
  • 10ARMBRUST M, FOX A, GRIFFITH R, etal. Above the clouds:a Berkeley view of cloud computing[ R/OL]. (2009-02-10) [2009-05- 15 ]. http ://www. grid. pku. edu. cn/cloud/Berkeley-abovetheclouds. pdf.

共引文献1232

同被引文献66

引证文献10

二级引证文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部