Role Based Access Control and the JXTA Peer-to-Peer Framework.

作者: Mark Stamp , Amit Mathur , Suneuy Kim

DOI:

关键词: Operating system levelPeer-to-peerHost (network)Computer scienceComputer networkRole-based access control

摘要: Role based access control (RBAC) allows users to resources on their competencies and responsibilities within an organization. Typically, RBAC is provided as a security mechanism for single host at the operating system level. This ensure that authenticated have assigned roles. more challenging in peer-to-peer (P2P) systems, due lack of centralized administration. In this paper we discuss over P2P network present implementation JXTA framework. popular open technology specification.

参考文章(8)
Mark Stamp, Digital Rights Management: The Technology Behidn The Hype Journal of Electronic Commerce Research. ,vol. 4, pp. 102- 112 ,(2003)
W. Scott Means, Elliotte Rusty Harold, XML in a Nutshell, Third Edition O'Reilly Media, Inc.. ,(2004)
Scott Oaks, Li Gong, JXTA in a Nutshell ,(2002)
Joon S. Park, Junseok Hwang, Role-based access control for collaborative enterprise in peer-to-peer computing environments Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03. pp. 93- 99 ,(2003) , 10.1145/775412.775424
John Barkley, Implementing role-based access control using object technology Proceedings of the first ACM Workshop on Role-based access control. pp. 20- ,(1996) , 10.1145/270152.270192
Huu Tran, M. Hitchens, V. Varadharajan, P. Watters, A Trust based Access Control Framework for P2P File-Sharing Systems hawaii international conference on system sciences. ,vol. 10, pp. 302- ,(2005) , 10.1109/HICSS.2005.58
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access control models IEEE Computer. ,vol. 29, pp. 38- 47 ,(1996) , 10.1109/2.485845