首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于使用控制的P2P访问模型
引用本文:张立冬,王凤英.基于使用控制的P2P访问模型[J].山东理工大学学报,2009,23(1).
作者姓名:张立冬  王凤英
作者单位:山东理工大学计算机科学与技术学院
摘    要:针对传统访问控制策略无法满足目前P2P(peer-to-peer)网络的安全需求,提出了一个基于使用控制的访问控制模型UCONP2P.该模型具有属性可变性和访问过程连续性,更加适合开放、动态的P2P网络环境;具有验证功能的UCONP2P模型,不但加强了节点间的访问安全性和可靠性,而且提高了共享资源的真实性和完整性.

关 键 词:对等网络  使用控制  验证  授权

Access model of peer-to-peer network based on UCON
ZHANG Li-dong,WANG Feng-ying.Access model of peer-to-peer network based on UCON[J].Journal of Shandong University of Technology:Science and Technology,2009,23(1).
Authors:ZHANG Li-dong  WANG Feng-ying
Institution:College of Computer Science and Technology;Shandong University of Technology;Zibo 255049;China
Abstract:Because the traditional access control strategies can not meet the security needs of current P2P(peer-to-peer) network,an access control model UCONP2P based on usage control(UCON) was proposed.This model has mutability of attributes and continuity of access,which is more suitable for the open and dynamic P2P network environment.With the certification function,UCONP2P model not only strengthens the safety and reliability of peer access,but also enhances the authenticity and integrity of sharing resources.
Keywords:P2P  UCON  authentication  authorization  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号