Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2009, Volume 11, Issue 8

Double access control model of web service based ondistributed simulation system

School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China

Funding project:武器装备预研基金 Received: 2007-11-28 Available online: 2009-08-12 09:07:52.000

Next Previous

Abstract

As web service is taken up to develop distributed simulation system increasingly, the separation between functions and resources is obvious. This exposes many simulation resources to the wide area network, which are difficult for traditional and single access control models to deal with. A double access control based on attributes is proposed to achieve the access control of application function and simulation resources. The process flow of the access control is described in detail. Also, the model is realized and applied in the prototype of simulation based on acquisition system. The performance of resource access control realized on XACML is analyzed and tested, which proves the feasibility of the model.

Figures

图1

图2

图3

图4

图5

图6

References

[ 1 ] Lorch Markus, Cowles Bob.Conceptual Grid Authorization Frame- work and Classification[ Z] .2004

[ 2 ] Eastlake D,Reagle J,Imamura T, et al.XML Encryption Syntax and Processing[ OL] .( 2002 -12 -10 )

[ 3 ] Eastlake D,Reagle J,Solo D, et al.XML -Signature Syntax and Processing[ EB /OL] .( 2002 -02 -12 )

[ 4 ] Ford Warwick, Hallam -Baker Phillip, Fox Barbara, et al.XML Key Management Specification ( XKMS) [ EB /OL] .( 2001 -03 -30 ) [ 2007 -8 -30 ] .http: //www.w3.org /TR /2001 /NOTE -xkms -20010330 /

[ 5 ] Hallam -Baker Phillip, Mysore Shivaram H.XML Key Management Specification (XKMS 2.0) [ EB /OL].(2005 -06 -28) [2007 -8 - 30].http://www.w3.org /TR /2005 /REC -xkms2 -20050628

[ 6 ] IBM, Microsoft.Security in a Web Services World: A Proposed Architecture and Roadmap[ EB /OL] .( 2002 -04 -07 ) [ 2007 - 8 -23 ]

[ 7 ] Cantor Scott, Kemp John, Philpott Rob, et al.Assertions and Protocols for the OASIS Security Assertion Markup Language[ EB / OL] .( 2005 -03 -15 ) [ 2007 -9 -3 ] .http: //www.oasis - open.org /committees /security /

[ 8 ] Tim Moses.OASIS eXtensible Access Control Markup Language [ EB /OL] .( 2005 -02 -01 ) [ 2007 -8 -24 ] .http: //www.oa- sis -open.org /committees /tc_home.php? wg_abbrev =xacml

[ 9 ] 傅鹤岗,李竞.基于属性的Web服务访问控制模型[J].计算机科学.2007,34(5):111-114 link1

[10] 杨怀洲,李增智.基于Web Service的安全业务体系结构的设计[J].计算机工程,2005,31(20):146-148 link1

[11] 韩涛,郭荷清.Web服务安全模型的研究与实现[J].计算机工程,2006,32(10):130-131 link1

[12] 裴艳琴,杨寿保,房向明,等.基于SAML的网格策略部署和认证机制[J].计算机工程,2007,33(1):170-172 link1

Related Research