Applications Access Control Model Based on Role in Transparent Computing Environment
-
Abstract
A TCACM (Transparent computing access control model) based on role in transparent computing environment is proposed. The model can solve the problem of system security in transparent computing. The model consists of two parts: the client and the server. The client initiates the application, calculates the application's data fingerprint, matches it with the server-side "security application" database for integrity verification. According to the authorization role permission set for authorization verification, by the verification results dynamically manage the user can run the application set. The experimental results verify the feasibility of the model.
-
-