|
|
The Research of Security Model and Access Control Security Strategy of Digital Library in Grid Computing Environment |
Ni Wenyin Yin Feng Huang Jianqi |
(The Library of Changsha University, Changsha 410003, China) |
|
|
Abstract Based on the security demands of grid, the paper proposes a retracted and extensible security strategy of access control as well as the corresponding security model. It also presents a flexible access control security policy, which supports the inherent dynamics, flexibility and expansibility of grid computing environment. Based on the strategy design, the corresponding access control security model is able to support identity authentication and access control through XML-based inquiring request / assertive response language SAML and extensible access control language XACML.
|
Received: 14 November 2007
Published: 25 April 2008
|
|
Corresponding Authors:
Ni Wenyin
E-mail: masonni@163.com
|
About author:: Ni Wenyin,Yin Feng,Huang Jianqi |
[1] 郑然,金海,章勤. 网格工作流资源层次模型与访问机制[J]. 华中科技大学学报:自然科学版,2006(S1):37-40.
[2] Bacon J, Lloyd M, Moody K. Translating Role-Based Access Control Policy Within Context[M].In Policies for Distributed Systems and Networks,2001.
[3] Jajodia S, Samarati P, Subrahmanian V S. A Logical Language for Expressing Authorizations[C].In: IEEE Symposium on Security and Privacy, 1997.
[4] Damianou N, Dulay N, Lupu E, et al. The Ponder Policy Specification Language[C]. In: Proceedings of the International Workshop of Policies for Distributed Systems and Networks, 2001.
[5] 王鹏, 季明, 梅强,等. 交换式网络下HTTP会话的劫持研究及其对策[J]. 计算机工程, 2007,33(5):135-137.
[6] 费巧玲,徐向阳,蒋国清,等. 基于SSL的安全邮件解决方案[J]. 计算机工程, 2007,33(5):114-116.
[7] Chang F, Itzkovitz A, Karamcheti V. User-level Resource-constrained Sandboxing[C].In: Proceedings of the USENIX Windows Systems Symposium,2000.
[8] Lindholm T, Yellin F. The Java Virtual Machine Specification Addition-Wesley[M]. Second Edition, 1999.
[9] 杨艳, 陈性元, 杜学绘. 基于VPN的安全审计系统的设计与实现[J]. 计算机工程, 2007,33(9):177-179.
[10] 李佳,徐向阳. 角色管理自动化的访问控制[J]. 计算机工程, 2007,33(5):120-125.
[11] 蔡红霞,俞涛,方明伦. 制造网格中访问控制的研究[J]. 计算机集成制造系统, 2007,33(4):120-125. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|