分布式访问控制的工作流模型

Manoj V. Thomas, K. Sekaran
{"title":"分布式访问控制的工作流模型","authors":"Manoj V. Thomas, K. Sekaran","doi":"10.1109/ICACC.2013.78","DOIUrl":null,"url":null,"abstract":"In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Workflow Model for Distributed Access Control\",\"authors\":\"Manoj V. Thomas, K. Sekaran\",\"doi\":\"10.1109/ICACC.2013.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed.\",\"PeriodicalId\":109537,\"journal\":{\"name\":\"2013 Third International Conference on Advances in Computing and Communications\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Third International Conference on Advances in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACC.2013.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third International Conference on Advances in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC.2013.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在云计算或服务计算等分布式计算环境中,用户访问由服务提供商托管的各种服务和共享资源,以高效地完成任务。身份验证和授权是在此上下文中要执行的两个重要功能,以确保未经授权的用户不会访问分布式系统组件。在本文中,我们分析了该领域已经采用的各种分布式访问控制方法,并考虑了它们的优缺点。考虑到服务消费者和服务提供者的当前需求,我们为云计算范式提出了一个分布式访问控制体系结构。给出了云环境下分布式访问控制系统的工作流模型。本文还讨论了分布式访问控制领域的几个开放性问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Workflow Model for Distributed Access Control
In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信