计算机科学 ›› 2016, Vol. 43 ›› Issue (6): 141-145.doi: 10.11896/j.issn.1002-137X.2016.06.029

• 信息安全 • 上一篇    下一篇

一种跨域网络资源的安全互操作模型

唐成华,张鑫,王璐,王宇,强保华   

  1. 桂林电子科技大学广西信息科学实验中心 桂林541004;迪肯大学信息技术系 墨尔本VIC3125,桂林电子科技大学广西信息科学实验中心 桂林541004,桂林电子科技大学广西可信软件重点实验室 桂林541004,迪肯大学信息技术系 墨尔本VIC3125,桂林电子科技大学广西信息科学实验中心 桂林541004;桂林电子科技大学广西可信软件重点实验室 桂林541004
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61462020,7,61363006),广西自然科学基金(2014GXNSFAA118375),广西信息科学实验中心基金(20130329),广西可信软件重点实验室基金,广西高等学校高水平创新团队及卓越学者计划资助

Security Interoperation Model of Cross-domain Network Resources

TANG Cheng-hua, ZHANG Xin, WANG Lu, WANG Yu and QIANG Bao-hua   

  • Online:2018-12-01 Published:2018-12-01

摘要: 网络资源需要在安全策略控制下共享与互操作。针对多异构安全域域间资源互操作的安全问题,提出了一种基于RBAC安全策略的跨域网络资源的安全互操作模型。首先引入域间角色的概念,并定义跨域资源共享访问的要求;其次在跨域操作准则的基础上,提出异构域间资源安全互操作模型和访问算法;最后以实例场境对模型和算法进行了应用分析。结果表明,该方法针对性强,权限控制有效,为实现多域资源共享和互操作的安全保障提供了一种可行的途径。

关键词: 异构,跨域,安全域,安全互操作,网络安全

Abstract: Network resources are in need of sharing and interoperability under the control of security policy.Aiming at the interoperability security problem of the resources among the heterogeneous security domains,a security interoperation model of accessing to cross-domain network resources based on RBAC security policy was proposed.Firstly,the concept of inter-domain role was introduced,and the requirement of accessing to cross-domain resources sharing was defined.Secondly,based on the cross-domain operation criteria,the security interoperation model and access algorithm of heterogeneous inter domain resources were put forward.Finally,The model and algorithm were analyzed through the application environment of a real project case.Results show that this method has the characteristics of high pertinence and effective access control,and provides a feasible way for the security implementation of resources sharing and interoperation.

Key words: Heterogeneous,Cross-domain,Security domain,Security interoperation,Network security

[1] Xiong Y,Zhu Y,Yu P S.Top-k Similarity Join in Heterogeneous Information Networks[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(6):1710-1723
[2] David B,Vincent J,Felix K,et al.Enforceable security policies revisited[J].ACM Transactions on Information and System Security,2013,16(1):31-56
[3] Jin Li,Lu Zheng-ding,Zhao Feng.Research development on Secure Interoperation in multi-domain environment[J].Computer Science,2009,36(2):47-54(in Chinese) 金莉,卢正鼎,赵峰.多域环境下安全互操作研究进展[J].计算机科学,2009,36(2):47-54
[4] Gong L,Qian X.Computational issues in secure interoperation[J].IEEE Transactions on Software and Engineering,1996,22(1):43-52
[5] Demchenko Y,Gommans L,Tokmakoff A,et al.Policy Based Access Control in Dynamic Grid-based Collaborative Environment[C]∥Proceedings of the 2006 Int.Symposium on Collaborative Technologies and Systems.Las Vegas,USA:IEEE Computer Society,2006:64-73
[6] Dong Zhi-hua,Zhu Yuan-chang,Di Yan-qiang.Multi-architec-ture system interoperability approach using common data exchange model[J].Journal of Beijing University of Technology,2015,41(1):60-67(in Chinese) 董志华,朱元昌,邸彦强.利用通用数据交换模型实现多体系结构系统互操作的方法[J].北京工业大学学报,2015,1(1):60-67
[7] Squicciarini A C,Bertino E,Trombetta A,et al.A Flexible Approach to Multisession Trust Negotiations[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):16-29
[8] Liu Wei,Cai Jia-yong,He Ye-ping.A trustworthiness based ad-hoc secure interoperation method[J].Journal of Software,2007,18(8):1958-1967(in Chinese) 刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法[J].软件学报,2007,18(8):1958-1967
[9] Xie Si-jiang,Zha Ya-xing,Chi Ya-ping.Trust level based secure interoperation model[J].Application Research of Computer,2012,29(5):1922-1925(in Chinese) 谢四江,查雅行,池亚平.一种基于可信等级的安全互操作模型[J].计算机应用研究,2012,29(5):1922-1925
[10] Zou De-qing,Zou Yong-qiang,Qiang Wei-zhong,et al.Grid security interoperation and its application[J].Chinese Journal of Computers,2010,3(3):514-525(in Chinese) 邹德清,邹永强,羌卫中,等.网格安全互操作及其应用研究[J].计算机学报,2010,3(3):514-525
[11] Ye Chun-xiao,Guo Dong-heng.Research on secure interoperation in multi-domain environment[J].Journal of Computer Applications,2012,2(12):3422-3425(in Chinese) 叶春晓,郭东恒.多域环境下安全互操作研究[J].计算机应用,2012,2(12):3422-3425
[12] Zhang Shuai,Sun Jian-ling,Xu Bin,et al.RBAC based access control model for services compositions cross multiple enterprises[J].Journal of Zhejiang University(Engineering Science),2012,6(11):2035-2043(in Chinese) 张帅,孙建伶,徐斌,等.基于RBAC的跨多企业服务组合访问控制模型[J],浙江大学学报(工学版),2012,6(11):2035-2043

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!