[PDF][PDF] 自动信任协商及其发展趋势

廖振松, 金海, 李赤松, 邹德清 - 2006 - jos.org.cn
属性证书交换是一种在不同安全域里共享资源或进行商业事务交易的陌生人之间建立双方信任
关系的重要手段. 自动信任协商则通过使用访问控制策略提供了一种方法来规范敏感证书的交换 …

Delegation in role-based access control

J Crampton, H Khambhammettu - Computer Security–ESORICS 2006 …, 2006 - Springer
User delegation is a mechanism for assigning access rights available to a user to another
user. A delegation operation can either be a grant or transfer operation. Delegation for role …

[PDF][PDF] 基于量化角色的可控委托模型

翟征德 - 2006 - cjc.ict.ac.cn
摘! 要! 针对现有/K0& 委托模型在支持细致委托粒度和权限传播的可控性上存在的不足$
提出了量化角色的概念$ 实现了一种细粒度的委托约束机制$ 给出了一个形式化的基于量化角色 …

Fine-grained role-based delegation in presence of the hybrid role hierarchy

JBD Joshi, E Bertino - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Delegation of authority is an important process that needs to be captured by any access
control model. In role-based access control models, delegation of authority involves …

基于属性的扩展委托模型

叶春晓, 吴中福, 符云清, 钟将, 冯永 - 计算机研究与发展, 2006 - cqvip.com
为提高委托过程的安全性, 对现有委托模型进行了扩展, 提出了一个更加安全的基于属性的扩展
委托模型(ABDMA). ABDMA 中的委托约束不但包括委托先决条件(CR), 还包含委托属性表达式 …

A Bayesian approach to diagram matching with application to architectural models

D Mandelin, D Kimelman, D Yellin - Proceedings of the 28th international …, 2006 - dl.acm.org
IT system architectures, as well as other systems, are often described by formal models or
informal diagrams. In practice, there are often a number of versions of a model, eg for …

[PDF][PDF] 一种基于角色代理的服务网格虚拟组织访问控制模型

孙为群, 单保华, 张程, 刘晨 - 2006 - cjc.ict.ac.cn
摘! 要! 给出一种基于角色代理技术的虚拟组织访问控制模型% 与同类研究成果相比%
在不降低自治域的安全管理效率的情况下% 能够实现虚拟组织的细粒度授权和确保自治域的 …

Delegation in the role graph model

H Wang, SL Osborn - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
We present a model for delegation that is based on our decentralized administrative role
graph model. We use a combination of user/group assignment and user-role assignment to …

An attribute-based delegation model and its extension

Y Chunxiao, W Zhongfu… - Journal of Research and …, 2006 - search.informit.org
In existing delegation models, delegation security entirely depends on delegators and
security administrators, for delegation constraint in these models is only a prerequisite …

[PDF][PDF] 异构分布式CSCW 委托授权模型及其访问控制

张志勇, 普杰信 - Computer Engineering, 2006 - hncsa.org.cn
异构分布式CSCW 委托授权模型及其访问控制 Page 1 —71— 异构分布式CSCW 委托授权模型及
其访问控制 张志勇,普杰信 (河南科技大学电信学院,洛阳471003) 摘要:基于角色和活动的重要特性 …