首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算的CSCW系统访问控制
引用本文:张志勇,杨林,马建峰,普杰信. 基于可信计算的CSCW系统访问控制[J]. 华中科技大学学报(自然科学版), 2008, 36(1): 59-62
作者姓名:张志勇  杨林  马建峰  普杰信
作者单位:西安电子科技大学,教育部计算机网络与信息安全重点实验室,陕西,西安,710071;中国电子设备系统工程公司,北京,100039;河南科技大学,电子信息工程学院,河南,洛阳,471003;西安电子科技大学,教育部计算机网络与信息安全重点实验室,陕西,西安,710071
基金项目:国家自然科学基金 , 国家自然科学基金 , 河南科技大学青年研究基金
摘    要:针对现有的CSCW系统不能有效地保障终端平台的可信性以及安全策略和上层应用实施的完整性等问题,提出了基于可信计算技术的CSCW访问控制架构和协作站点间的基于角色的委托授权策略,分别描述了安全策略与共享对象密钥的分发协议、角色委托协议及策略完整性实施协议等.应用实例表明:该框架基于完整的协作实体-平台-应用信任链的构建,提供了可信的协作实体身份与访问控制平台,依赖平台远程证明和策略分发实现了在本地站点上的完整性实施;同时角色委托提高了协同工作能力,也减轻了服务器端集中式策略执行的负担.

关 键 词:计算机支持协同工作(CSCW)  访问控制  可信计算  策略实施  角色委托
文章编号:1671-4512(2008)01-0059-04
收稿时间:2006-11-10

CSCW system access control based on trusted computing
Zhang Zhiyong,Yang Lin,Ma Jianfeng,Pu Jiexin. CSCW system access control based on trusted computing[J]. JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY.NATURE SCIENCE, 2008, 36(1): 59-62
Authors:Zhang Zhiyong  Yang Lin  Ma Jianfeng  Pu Jiexin
Abstract:The trustworthiness of terminal platforms was not ensured effectively and the integrity of security policies and upper application was not implemented in existing CSCW systems. Therefore, trusted computing-based access control architecture for CSCW and roles-based delegation policy between collaboration workstations were presented. The security policies and sharing object key dissemination protocol, role delegation one and policy integrity enforcement one were respectively described. An example shows that owing to constructing a general entity platform-application trust chain, the trusted cooperative entity identity and the access control platform were provided in the architecture, and the integrity of policies was implemented on the platform in a local workstation through platform remote attestation and policy distribution. Moreover, the capability of cooperative work was improved and the burden of the centralized policies that was executed on server side is lessened.
Keywords:computer supported cooperative work(CSCW)  access control  trusted computing  policy enforcement  role delegation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号