Font Size: a A A

Research On Role Based Interoperation Access Control In Distributed Environment

Posted on:2007-07-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:D WuFull Text:PDF
GTID:1118360212956137Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The rapid development of Internet and related technologies has created tremendous possibilities for the interoperability between applications in open and heterogeneous distributed environment. Interoperability provides a means for distributed applications to share resources and services, which improves performance and resource utilization. Access control is a crucial security technology. It can control the legal users to sensitive resources effectively and ensure users to access relative resource. The distributed, heterogeneous, autonomic and dynamic characteristics of distributed applications bring many new challenges to the access control technology.Role Based Access Control (RBAC) model is a very flexible access control model and applies most widely. Although there are some researches that is discussing how to apply RBAC model to access control of interoperation now, they all have some shortages. To improve RBAC model in the access control of interoperation, a further discussion and practice for the key technologies of role based interoperation access control has been done. The main contributions of this dissertation are described as follows:(1) Bring out a role based interoperation access control model, which has implemented extensions of the whole core function, hierarchal relation and restriction relation of RBAC model with definitions of the role mapping relation in different access control domains.(2) Bring out distributed access control architecture of role based interoperation, which has implemented an extendable authorization and access check mechanism of interoperation access control with construction of interoperation global session based on .RBAC session.
Keywords/Search Tags:distributed applications, interoperation, access control, role based access control, security policy, security violation, detect, semantic specification
PDF Full Text Request
Related items