Font Size: a A A

Distributed Systems Security Access Control Issues

Posted on:2014-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:M M LiFull Text:PDF
GTID:2268330401985031Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The system security issue has been a hot and difficult issue in the system researchfield, it is particularly important especially in a distributed environment. This paper willconduct depth research on security access control method in the distributed system.Access control is an important measure to guarantee the security of a system, can restrictthe rights of users to access the system resources, in order to prevent the illegal users toaccess resources or the security problems caused by the misoperations of legitimate users.Role-based access control has become a research hotspot in the field of access control inrecent years; it realizes the logic separation from users to permissions through theintroduction of roles.To complete some larger tasks, the resources need to be frequently accessed by othercomputers. In order to ensure the access between distributed systems to be more secureand effective, the foreign visitors need to be granted the appropriately permissions in thissystem. This paper analyzes the existing problems of the access control in distributedenvironment, then improves the existing deficiencies in the role inheritance according tothese problems, and describes a way to achieve cross-domain authorization based on thefurther refinement permissions, which can resolve the security problems of resourceexchange access between systems.At present, the modeling of software system usually does not consider the securitypolicies and security mechanisms, this leads to a lot of security risks in such aspects assecurity maintenance and system integration during the late development of systems. Thispaper explores a kind of methods which can integrate RBAC features into the system, Atthe same time, the traditional access control lists have the following disadvantages:descriptive low, not enough flexibility, and difficult to transmit between different systems,etc., it is difficult to meet the access control demands of the system. The application ofXACML to the RBAC model can not only provide fine-grained access control, but alsoincrease the interoperability between systems.
Keywords/Search Tags:Access Control, RBAC, XACML, Model Integration
PDF Full Text Request
Related items