Computer Science ›› 2016, Vol. 43 ›› Issue (6): 141-145.doi: 10.11896/j.issn.1002-137X.2016.06.029

Previous Articles     Next Articles

Security Interoperation Model of Cross-domain Network Resources

TANG Cheng-hua, ZHANG Xin, WANG Lu, WANG Yu and QIANG Bao-hua   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Network resources are in need of sharing and interoperability under the control of security policy.Aiming at the interoperability security problem of the resources among the heterogeneous security domains,a security interoperation model of accessing to cross-domain network resources based on RBAC security policy was proposed.Firstly,the concept of inter-domain role was introduced,and the requirement of accessing to cross-domain resources sharing was defined.Secondly,based on the cross-domain operation criteria,the security interoperation model and access algorithm of heterogeneous inter domain resources were put forward.Finally,The model and algorithm were analyzed through the application environment of a real project case.Results show that this method has the characteristics of high pertinence and effective access control,and provides a feasible way for the security implementation of resources sharing and interoperation.

Key words: Heterogeneous,Cross-domain,Security domain,Security interoperation,Network security

[1] Xiong Y,Zhu Y,Yu P S.Top-k Similarity Join in Heterogeneous Information Networks[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(6):1710-1723
[2] David B,Vincent J,Felix K,et al.Enforceable security policies revisited[J].ACM Transactions on Information and System Security,2013,16(1):31-56
[3] Jin Li,Lu Zheng-ding,Zhao Feng.Research development on Secure Interoperation in multi-domain environment[J].Computer Science,2009,36(2):47-54(in Chinese) 金莉,卢正鼎,赵峰.多域环境下安全互操作研究进展[J].计算机科学,2009,36(2):47-54
[4] Gong L,Qian X.Computational issues in secure interoperation[J].IEEE Transactions on Software and Engineering,1996,22(1):43-52
[5] Demchenko Y,Gommans L,Tokmakoff A,et al.Policy Based Access Control in Dynamic Grid-based Collaborative Environment[C]∥Proceedings of the 2006 Int.Symposium on Collaborative Technologies and Systems.Las Vegas,USA:IEEE Computer Society,2006:64-73
[6] Dong Zhi-hua,Zhu Yuan-chang,Di Yan-qiang.Multi-architec-ture system interoperability approach using common data exchange model[J].Journal of Beijing University of Technology,2015,41(1):60-67(in Chinese) 董志华,朱元昌,邸彦强.利用通用数据交换模型实现多体系结构系统互操作的方法[J].北京工业大学学报,2015,1(1):60-67
[7] Squicciarini A C,Bertino E,Trombetta A,et al.A Flexible Approach to Multisession Trust Negotiations[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):16-29
[8] Liu Wei,Cai Jia-yong,He Ye-ping.A trustworthiness based ad-hoc secure interoperation method[J].Journal of Software,2007,18(8):1958-1967(in Chinese) 刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法[J].软件学报,2007,18(8):1958-1967
[9] Xie Si-jiang,Zha Ya-xing,Chi Ya-ping.Trust level based secure interoperation model[J].Application Research of Computer,2012,29(5):1922-1925(in Chinese) 谢四江,查雅行,池亚平.一种基于可信等级的安全互操作模型[J].计算机应用研究,2012,29(5):1922-1925
[10] Zou De-qing,Zou Yong-qiang,Qiang Wei-zhong,et al.Grid security interoperation and its application[J].Chinese Journal of Computers,2010,3(3):514-525(in Chinese) 邹德清,邹永强,羌卫中,等.网格安全互操作及其应用研究[J].计算机学报,2010,3(3):514-525
[11] Ye Chun-xiao,Guo Dong-heng.Research on secure interoperation in multi-domain environment[J].Journal of Computer Applications,2012,2(12):3422-3425(in Chinese) 叶春晓,郭东恒.多域环境下安全互操作研究[J].计算机应用,2012,2(12):3422-3425
[12] Zhang Shuai,Sun Jian-ling,Xu Bin,et al.RBAC based access control model for services compositions cross multiple enterprises[J].Journal of Zhejiang University(Engineering Science),2012,6(11):2035-2043(in Chinese) 张帅,孙建伶,徐斌,等.基于RBAC的跨多企业服务组合访问控制模型[J],浙江大学学报(工学版),2012,6(11):2035-2043

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!