首页 | 本学科首页   官方微博 | 高级检索  
     

一种跨域网络资源的安全互操作模型
引用本文:唐成华,张鑫,王璐,王宇,强保华. 一种跨域网络资源的安全互操作模型[J]. 计算机科学, 2016, 43(6): 141-145
作者姓名:唐成华  张鑫  王璐  王宇  强保华
作者单位:桂林电子科技大学广西信息科学实验中心 桂林541004;迪肯大学信息技术系 墨尔本VIC3125,桂林电子科技大学广西信息科学实验中心 桂林541004,桂林电子科技大学广西可信软件重点实验室 桂林541004,迪肯大学信息技术系 墨尔本VIC3125,桂林电子科技大学广西信息科学实验中心 桂林541004;桂林电子科技大学广西可信软件重点实验室 桂林541004
基金项目:本文受国家自然科学基金(61462020,7,61363006),广西自然科学基金(2014GXNSFAA118375),广西信息科学实验中心基金(20130329),广西可信软件重点实验室基金,广西高等学校高水平创新团队及卓越学者计划资助
摘    要:网络资源需要在安全策略控制下共享与互操作。针对多异构安全域域间资源互操作的安全问题,提出了一种基于RBAC安全策略的跨域网络资源的安全互操作模型。首先引入域间角色的概念,并定义跨域资源共享访问的要求;其次在跨域操作准则的基础上,提出异构域间资源安全互操作模型和访问算法;最后以实例场境对模型和算法进行了应用分析。结果表明,该方法针对性强,权限控制有效,为实现多域资源共享和互操作的安全保障提供了一种可行的途径。

关 键 词:异构  跨域  安全域  安全互操作  网络安全
收稿时间:2015-05-12
修稿时间:2015-08-11

Security Interoperation Model of Cross-domain Network Resources
TANG Cheng-hu,ZHANG Xin,WANG Lu,WANG Yu and QIANG Bao-hua. Security Interoperation Model of Cross-domain Network Resources[J]. Computer Science, 2016, 43(6): 141-145
Authors:TANG Cheng-hu  ZHANG Xin  WANG Lu  WANG Yu  QIANG Bao-hua
Affiliation:Guangxi Experiment Center of Information Science,Guilin University of Electronic Technology,Guilin 541004,China;School of Information Technology,Deakin University,Melbourne VIC3125,Australia,Guangxi Experiment Center of Information Science,Guilin University of Electronic Technology,Guilin 541004,China,Guangxi Key Laboratory of Trusted Software,Guilin University of Electronic Technology,Guilin 541004,China,School of Information Technology,Deakin University,Melbourne VIC3125,Australia and Guangxi Experiment Center of Information Science,Guilin University of Electronic Technology,Guilin 541004,China;Guangxi Key Laboratory of Trusted Software,Guilin University of Electronic Technology,Guilin 541004,China
Abstract:Network resources are in need of sharing and interoperability under the control of security policy.Aiming at the interoperability security problem of the resources among the heterogeneous security domains,a security interoperation model of accessing to cross-domain network resources based on RBAC security policy was proposed.Firstly,the concept of inter-domain role was introduced,and the requirement of accessing to cross-domain resources sharing was defined.Secondly,based on the cross-domain operation criteria,the security interoperation model and access algorithm of heterogeneous inter domain resources were put forward.Finally,The model and algorithm were analyzed through the application environment of a real project case.Results show that this method has the characteristics of high pertinence and effective access control,and provides a feasible way for the security implementation of resources sharing and interoperation.
Keywords:Heterogeneous  Cross-domain  Security domain  Security interoperation  Network security
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号