计算机科学 ›› 2016, Vol. 43 ›› Issue (10): 150-153.doi: 10.11896/j.issn.1002-137X.2016.10.028
刘志锋,毛竹林
LIU Zhi-feng and MAO Zhu-lin
摘要: UCON模型作为新一代的访问控制模型,能够通过可变属性对使用实现连续控制,可满足当前开放的网络环境需求。但UCON模型仍存在一些缺陷:不能实现对权限的管理、对权限的委托和对属性来源的管理。为此,在UCON模型的基础上引入角色元素并把角色分为提供者角色和消费者角色,然后把权限分为直接使用权限和需要授权权限,以实现对UCON模型中权限的管理和权限的委托,并通过提供者角色对可变属性的来源进行管理,使UOCN对权限管理更加灵活,属性来源更加可信,从而使UCON的应用范围更加广泛。
[1] Park J,Sandhu R.Towards usage control models:beyond traditional access control[C]∥Proceedings of the Seventh ACM Symposium on Access Control models and Technologies.ACM,2002:57-64 [2] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174 [3] Wang Y D,Yang J H,Xu C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,6(5):1129-1150(in Chinese) 王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150 [4] Cai Ting,Chen Chang-zhi.Research for Access Control based on UCON in Cloud Computing[J].Computer Science,2014(S1):262-264(in Chinese) 蔡婷,陈昌志.云环境下基于UCON的访问控制模型研究[J].计算机科学,2014(S1):262-264 [5] Zhang Guang-hua.Research on Security Models Based on Trust Management[D].Xi’an:Xidian University,2014(in Chinese) 张光华.基于信任管理的安全模型研究[D].西安:西安电子科技大学,2014 [6] Guo Jing-jing,Ma Jian-feng,Li Qi,et al.Game theory basedtrust management method for mobile ad hoc networks[J].Journal on Communications,2014,35(11):50-58(in Chinese) 郭晶晶,马建峰,李琦,等.基于博弈论的移动自组织网络的信任管理方法[J].通信学报,2014,35(11):50-58 [7] Lv Jing-hua.Research on Techniques of Usage Control in Mobile Digital Publishing Rights Management [D].Beijing:Beijing University of Posts and Telecommunications,2013(in Chinese) 吕井华.移动数字出版版权保护使用控制技术研究[D].北京:北京邮电大学,2013 [8] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007.NPC Workshops.IEEE,2007:238-243 [9] Cai Wei-hong.The Research of Access Control Model Based on EUCON [D].Guangzhou:South China University of Technology,2012(in Chinese) 蔡伟鸿.基于EUCON的访问控制技术研究[D].广州:华南理工大学,2012 [10] Salim F,Reid J,Dawson E.An administrative model forUCONABC [C]∥Proceedings of the Eighth Australasian Conference on Information Security-Volume 105.Australian Computer Society,Inc.,2010:32-38 [11] Lu Ke,Zhou Bao-qun,Wang Hui-fang.Usage Control ModelBased on Timed RBAC and Its Administration [J].Computer Engineering,2008,34(6):170-172(in Chinese) 鲁柯,周保群,王惠芳.基于带时间特性RBAC的使用控制模型及其管理[J].计算机工程,2008,34(6):170-172 [12] Shibli M A,Ali A.Extensible Access Control Framework for Cloud based Applications[EB/OL].http://ais.seecs.nust.edu.pk/project [13] Jiao D,Lianzhong L,Ting L,et al.Realization of UCON Model Based on extended-XACML[C]∥2011 International Conference on Future Computer Sciences and Application (ICFCSA).IEEE,2011:90-93 [14] Masood R,Shibli M A,Bilal M.Usage control model specification in XACML policy language[M]∥Computer Information Systems and Industrial Management.Springer Berlin Heidelberg,2012:68-79 [15] Colombo M,Lazouski A,Martinelli F,et al.A proposal on enhancing XACML with continuous usage control features[M]∥Grids,P2P and Services Computing.Springer US,2010:133-146 |
No related articles found! |
|