赵晓参, 王国军. 基于角色的透明计算应用权限控制模型[J]. 微电子学与计算机, 2017, 34(11): 80-84.
引用本文: 赵晓参, 王国军. 基于角色的透明计算应用权限控制模型[J]. 微电子学与计算机, 2017, 34(11): 80-84.
ZHAO Xiao-can, WANG Guo-jun. Applications Access Control Model Based on Role in Transparent Computing Environment[J]. Microelectronics & Computer, 2017, 34(11): 80-84.
Citation: ZHAO Xiao-can, WANG Guo-jun. Applications Access Control Model Based on Role in Transparent Computing Environment[J]. Microelectronics & Computer, 2017, 34(11): 80-84.

基于角色的透明计算应用权限控制模型

Applications Access Control Model Based on Role in Transparent Computing Environment

  • 摘要: 提出一种基于角色的透明计算应用权限控制模型TCACM(Transparent computing access control model).该模型能够较好地解决透明计算中的系统安全性问题.该模型由客户端和服务器端两部分组成.客户端启动应用程序, 计算出应用程序的数据指纹, 将其与服务器端"安全应用程序"数据库匹配, 进行完整性验证; 根据授权角色权限集进行授权验证, 由验证结果动态地管理用户可运行应用程序集.实验结果验证了该模型的可行性.

     

    Abstract: A TCACM (Transparent computing access control model) based on role in transparent computing environment is proposed. The model can solve the problem of system security in transparent computing. The model consists of two parts: the client and the server. The client initiates the application, calculates the application's data fingerprint, matches it with the server-side "security application" database for integrity verification. According to the authorization role permission set for authorization verification, by the verification results dynamically manage the user can run the application set. The experimental results verify the feasibility of the model.

     

/

返回文章
返回