计算机技术 |
|
|
|
|
基于RBAC的跨多企业服务组合访问控制模型 |
张帅1,孙建伶1,徐斌1,黄超1,2,KAVS Aleksander J2. |
1. 浙江大学 计算机科学与技术学院, 浙江 杭州310027; 2. 道富信息科技(浙江)有限公司, 浙江 杭州 310012 |
|
RBAC based access control model for services compositions
cross multiple enterprises |
ZHANG Shuai1, SUN Jian-ling1, XU Bin1, HUANG Chao1,2, KAVS Aleksander J2. |
1. College of Computer Science and Technology , Zhejiang University , Hangzhou 310027, China;
2. State Street Technology (ZheJiang) Co. Ltd, Hangzhou 310012, China |
引用本文:
张帅,孙建伶,徐斌,黄超,KAVS Aleksander J.. 基于RBAC的跨多企业服务组合访问控制模型[J]. J4, 2012, 46(11): 2035-2043.
ZHANG Shuai, SUN Jian-ling, XU Bin, HUANG Chao, KAVS Aleksander J.. RBAC based access control model for services compositions
cross multiple enterprises. J4, 2012, 46(11): 2035-2043.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2012.11.015
或
http://www.zjujournals.com/eng/CN/Y2012/V46/I11/2035
|
[1] PAPAZOGLOU M. Serviceoriented computing: concepts, characteristics and directions [C]∥ 4th International Conference on Web Information Systems Engineering. Rome, Italy: IEEE, 2003: 3-12.
[2] MILANOVIC N, MALEK M. Current solutions for Web service composition [J]. IEEE Internet Computing, 2004, 8(6): 51-59.
[3] SRIVATSA M, IYENGAR A, MIKALSEN T, et al, An access controlsystem for Web service compositions [C]∥ IEEE International Conference on Web Services . Salt Lake City, USA: IEEE, 2007: 1-8.
[4] 王雅哲,冯登国.域间授权互操作研究综述 [J]. 计算机研究与发展, 2010, 47(10):1673-1689.
WANG Yazhe, FENG Dengguo. A survey of research on interdomain authorization interoperation [J]. Journal of Computer Research and Development, 2010, 47(10):1673-1689.
[5] ZHANG Y , JOSHI J. A requestdriven secure interoperation framework in looselycoupled multidomain environments employing RBAC policies [C]∥ IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. New York, USA: IEEE, 2007: 25-32.
[6] HU Jinwei, Li Ruixuan, LU Zhengding. Establishing RBACbased secure interoperability in decentralized multidomain environments [C]∥ Proceedings of the 10th international conference on Information security and cryptology. Heidelberg, Germany: SpringerVerlag Berlin, 2007 49-63.
[7] ZHANG Shuai, SUN Jianling, SHEN Yuanhong, et al, Optimizing performance of composite services in multiple networks enterprise environment [J]. Information Technology Journal, 2011(10): 807-815.
[8] DUSTDAR S , SCHREINER W, A survey on web services composition [J]. International Journal of Web and Grid Services 2005(1): 1-30.
[9] BEEK M, BUCCHIARONE A, GNESI S: Web service composition approaches: from industrial standards to formal methods [C]∥ Proceedings of the Second International Conference on Internet and Web Applications and Services 2007. Washington DC, USA: IEEE Computer Society, 15-21.
[10] CHAFLE G, CHANDRA S, MANN V, et al, Decentralized orchestration of composite web services [C]∥ Proceedings of the 13th international World Wide Web conference. New York, USA: ACM, 2004: 134-143.
[11] YILDIZ U, GODART C. Towards decentralized service orchestrations [C]∥ Proceedings of the 2007 ACM symposium on Applied computing. New York, USA: ACM, 1662-1666.
[12] SHAFIQ B, JOSHI J, BERTINO E, et al: Secure interoperation in a multi domain environment employing RBAC policies [J]. IEEE Transactions on Knowledge and Data Engineering 2005. 17(11): 1557-1577.
[13] SANDHU R, COYNE E, FEINSTEIN H, et al, Rolebased access control models [J]. IEEE Computer, 1996 29(2): 38-47.
[14] DAMIANI E, VIMERCATI S, PARABOSCHI S. et al. Fine grained access control for SOAP eservices [C]∥ 10th Int. Conference on World Wide Web (WWW). New York, USA: ACM, 2001: 504-513.
[15] WONOHOESODO R ,TARI Z, A role based access control for Web services [C]∥ IEEE International Conference on Services Computing 2004. Shanghai: IEEE, 2004:49-56.
[16] FISCHER J , MAJUMDAR R, A Theory of Role Composition [C]∥ IEEE International Conference on Web Services 2008. Beijing: IEEE, 320-328.
[17] HUANG Chao, SUN Jianling, WANG Xinyu, et al. Minimal role mining method for Web service composition [J]. Journal of Zhejiang UniversityScience C, 2010(11): 28-339.
[18] DU S , JOSHI J, Supporting authorization query and interdomain role mapping in presence of hybrid role hierarchy [C]∥ Proceedings of the 17th ACM symposium on Access control models and technologies. New York, USA: ACM, 2006: 228-236.
[19] OASIS, Security assertion markup language (SAML) [EB/OL]. [20050325]. http:∥saml.xml.org/aboutsaml.
[20] SALTZER J , SCHROEDER M, The protection of information in computer systems [J]. Proceedings of the IEEE, 1975(63): 1278-1308.
[21] MOSES T. eXtensible access control markup language (XACML) Version 20 [EB/OL]. [2005-02-01].http:∥docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|