期刊文献+

Web服务协同环境下个性化访问控制框架的实现 被引量:2

Implementation of customerized access control framework in Web services-based collaborative environment
在线阅读 下载PDF
导出
摘要 根据Web服务的协同环境下个性化访问控制的特点,提出了一个利用Web服务的消息中间件机制来建立一个访问控制框架,并配合扩充了的RBAC-3访问控制模型,实现对Web服务的个性化访问控制。最后还给出了测试与优化的结果。 .Compute This article according to the characteristics of customerized access control under the Web services-based collaborative environment,establishes an access control framework using the Web services message handler mechanism.With the expanding of the RBAC-3 access control model,article implements the customerized access control framework,finally has also produced the test and the result.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第18期157-160,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60203026) 。
关键词 WEB服务 消息中间件 访问控制 RBAC Web services message-oriented middleware access control RBAC
  • 相关文献

参考文献9

  • 1W3C.Web services architecture[EB/OL].(2003 -08 -08).http://www.w3.org/TR/2003/WD-ws-arch.
  • 2W3C.Simple Object Access Protocol (SOAP) 1.1[EB/OL].(2000-05).www.w3.org/TR/SOAP/.
  • 3W3C.Web Services Description Language(WSDL)1.1[EB/OL].(2001-03).www.w3c.org/TR/wsdl.
  • 4Specification:Web Services Security(WS-Security)[EB/OL].(2002-04 -05).http://www-106.ibm.com/developerworks/webservices/library/ws-secure/ Version 1.0.
  • 5Shen Hong-Hai,Dewan P.Prasun,access control for collaborative environments[C]//Proc Conference on Computer Supported Cooperative Work,1992.
  • 6OASIS.Web Services Security(WSS)TC[EB/OL].http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss.
  • 7Sandhu R S,Samarati P.Access control:principles and practice[J].IEEE Communication Magazine,1994(9):40-48.
  • 8Dewan P,Shen H.Flexible meta access-controlfor collaborative applications[C]//CSCW'98,Seattle,November 1998.
  • 9郎波,吴琦,陆悠,李伟琴.分布式对象柔性化访问控制方法[J].北京航空航天大学学报,2004,30(5):452-455. 被引量:6

二级参考文献6

  • 1[1]Object Management Group. CORBA security services specification[PB/OL]. http://www.omg.org, 2001,1(7)
  • 2[2]Iona Company. Iona Programmers' Guide[CP/DK]. Http: ∥www. Iona. Com//products/orbix2000, 2002
  • 3[3]Sandhu R S, Samarati P. Access control: principles and practice [J],IEEE Communication Magazine,1994,32(9): 40~48
  • 4[4]Timothy J F. An object-oriented framework for security policy representation[D]. Champaign, luinois: UIUC, 1997
  • 5[5]Dirk J, Klaus R. D. An approach for building secure database federations[A]. In :Proc.lnt'l. Conf. On Very Large Data Bases[C].San Francisco: Morgan Kaufmann Publishers Inc, 1994.24 ~ 35
  • 6[6]Rabitti F, Bertino E, Kim W, et al. A model of authorization for next-generation database systems [J]. ACM Trans. On Database Systems, 1991,16(1): 89 ~ 131

共引文献5

同被引文献18

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部