• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.
Citation: Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.

Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment

More Information
  • Published Date: September 14, 2005
  • Secure communication environment of multiple autonomous domains collaboration is the basis of large-scale distributed applications, group communication with the character of high efficiency and flexibility is the basic communication mode. However, these collaborative applications lack central control, and in addition their users and resources belong to different autonomous domains. Users in collaborative environments expect to join/leave group, access domain resources dynamically, which leads to large numbers of new security challenges and access control problem. In view of the heterogeneous and dynamic character of multiple autonomous domains collaboration, role-based access control with distributed trust management is complemented and a role-based distributed trust management framework is proposed, thus resolving dynamic joint authorization and attribute-based delegation authorization. Meanwhile, an infrastructure is presented, which includes security policy negotiation, credentials issue, proof-of-compliance for the credentials and access control policy, and reasoning about users' access rights. A more flexible, reliable, secure access control model is provided for the collaborative environment of multi-domains group communication.
  • Related Articles

    [1]Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei. Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies[J]. Journal of Computer Research and Development, 2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459
    [2]Su Mang, Cao Mengyuan, Xie Rongna, Fu Anmin. PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud[J]. Journal of Computer Research and Development, 2018, 55(7): 1479-1487. DOI: 10.7544/issn1000-1239.2018.20180056
    [3]Wu Guangqiang. Multi-Authority CP-ABE with Policy Update in Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432
    [4]Wang Jing, Huang Chuanhe, Wang Jinhai. An Access Control Mechanism with Dynamic Privilege for Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(4): 904-920. DOI: 10.7544/issn1000-1239.2016.20150158
    [5]Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
    [6]Zhang Desheng, Feng Dengguo, Chen Chi. An Authorization Model and Implementation for Vector Data in Spatial DBMS[J]. Journal of Computer Research and Development, 2011, 48(8): 1524-1533.
    [7]Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.
    [8]Wang Yazhe and Feng Dengguo. A Survey of Research on Inter-Domain Authorization Interoperation[J]. Journal of Computer Research and Development, 2010, 47(10): 1673-1689.
    [9]Wu Zhenqiang, Ma Jianfeng. A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property[J]. Journal of Computer Research and Development, 2006, 43(7): 1240-1245.
    [10]Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953.

Catalog

    Article views (491) PDF downloads (530) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return