首页 | 本学科首页   官方微博 | 高级检索  
     

P2P中基于信任和属性的访问控制
引用本文:封孝生,王桢文,黎湘运. P2P中基于信任和属性的访问控制[J]. 计算机科学, 2011, 38(2): 28-31,41
作者姓名:封孝生  王桢文  黎湘运
作者单位:国防科技大学C4ISR技术国防科技重点实验室,长沙,410073
基金项目:本文受国家自然科学基金(60903225,70971134)资助。
摘    要:P2P具有无集中控制节点、节点对等自治和网络动态的特点,这些特点为实施访问控制带来很大的挑战,传统的访问控制技术不能很好地适应对等网环境。首先对现有的对等网环境中的访问控制技术进行研究,然后在基于信任模型的角色访问控制的基础上,针对无法区分通过信任模型计算出相同结果的用户的问题,提出了基于信任和属性的访问控制。基于信任和属性的访问控制引入资源属性和用户属性来分别描述资源和用户,依据用户属性、信任模型计算出的数值、环境属性和授权策略来建立用户角色指派关系,依据资源属性和授权策略来建立角色权限指派关系,从而解决基于信任模型的角色访问控制存在的问题。

关 键 词:访问控制,属性,P2P

Trust-Attribute-based Access Control in P2P Environments
FENG Xiao-sheng,WANG Zhen-wen,LI Xiang-yun. Trust-Attribute-based Access Control in P2P Environments[J]. Computer Science, 2011, 38(2): 28-31,41
Authors:FENG Xiao-sheng  WANG Zhen-wen  LI Xiang-yun
Affiliation:(C4ISR Technology National Defense Science and Technology Key LAB, National University of Defense Technology, Changsha 410073 , China)
Abstract:Traditional access control models which are based on identity are not adaptive in P2P environments, which characterize non-centralization, autonomy and dynamic characteristic. We analyzed the access control issue in P2P environments. The existing trust based role access control lacks measures to distinguish users whose results from a trust model are same. We proposed trust attribut}based access control to deal with this problem. Trust attribute-based access control describes users and resources using user attributes and resource attributes. The model builds user role assignment using user attributes, the result from a trust model, environment attributes and authorization policy and builds role permission assignment using resource attributes and authorization policy.
Keywords:Access control   Attribute   P2P
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号