ZHAO Xiao-can, WANG Guo-jun. Applications Access Control Model Based on Role in Transparent Computing Environment[J]. Microelectronics & Computer, 2017, 34(11): 80-84.
Citation: ZHAO Xiao-can, WANG Guo-jun. Applications Access Control Model Based on Role in Transparent Computing Environment[J]. Microelectronics & Computer, 2017, 34(11): 80-84.

Applications Access Control Model Based on Role in Transparent Computing Environment

  • A TCACM (Transparent computing access control model) based on role in transparent computing environment is proposed. The model can solve the problem of system security in transparent computing. The model consists of two parts: the client and the server. The client initiates the application, calculates the application's data fingerprint, matches it with the server-side "security application" database for integrity verification. According to the authorization role permission set for authorization verification, by the verification results dynamically manage the user can run the application set. The experimental results verify the feasibility of the model.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return