Cross-domain access control for e-government cloud based on

Loading...

March 11, 2018

Home | advertisement | About Journal | Editorial Board | Order | downloads | Message | Contacts Us | Q & A | Chinese Version

Journal of Computer Applications 2016, Vol. 36 Issue (2): 402-407 DOI: 10.11772/j.issn.1001-9081.2016.02.0402 Current Issue| Next Issue| Archive| Adv Search

|

Cross-domain access control for e-government cloud based on classification CHI Yaping1, WANG Yan2, WANG Huili 1, LI Xin2 1. Department of Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China; 2. School of Telecommunications Engineering, Xidian University, Xi'an Shaanxi 710071, China

Abstract

Figure/Table

References

Related Citation (15)

Download: PDF (875 KB) HTML (1 KB) Export: BibTeX | EndNote (RIS) Abstract Since the access control grain is not enough fine while users share resource during e-government cloud cross-domain access, a crossdomain access control scheme based on user's classification was proposed. In this scheme, a typical cloud computing access control mechanism ——Identity and Access-control Management (IAM) was adopted, the assertion attribute authentication based on user classification was implemented, the obstruction caused by heterogeneity during resource sharing was also eliminated, and a fine-grained cross-domain access control mechanism was provided. Finally, a cross-domain system for cloud computer environment based on Shibboleth and secure component keystone of OpenStack was built, the feasibility of the scheme was proved by the test of comparing the tokens between inter-domain and outerdomain of a user. Key words e-government cloud cross-domain access control classification Identity and Access-control Management(IAM)

Service

E-mail this article Add to my bookshelf Add to citation manager E-mail Alert RSS

Security Assertion Markup Language(SAML)

Articles by authors

Received: 29 August 2015

CHI Yaping WANG Yan WANG Huili LI Xin Cite this article: CHI Yaping,WANG Yan,WANG Huili. Cross-domain access control for e-government cloud based on classification[J]. Journal of Computer Applications, 2016, 36(2): 402-407. URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2016.02.0402 OR http://www.joca.cn/EN/Y2016/V36/I2/402

Copyright ©2005 Sichuan Computer Applications Press Co., Ltd. Address:No. 9, 4th Section, South Renmin Road, Wuhou District, Chengdu 610041, China ()026 ICP 05010208 Tel028-85224283-803 [email protected] Service Terms | Private Policy Supportted by Magtech

Loading...

Cross-domain access control for e-government cloud based on

March 11, 2018 Home | advertisement | About Journal | Editorial Board | Order | downloads | Message | Contacts Us | Q & A | Chinese Version Journa...

61KB Sizes 2 Downloads 5 Views

Recommend Documents

Privacy aware access control for data sharing in cloud computing
Jun 3, 2014 - SCC '14 Proceedings of the 2nd international workshop on Security in cloud computing. Pages 27- ... Privac

313 best Access Control images on Pinterest | Access control, Door
Explore Waard om te kopen's board "Access Control" on Pinterest. | See more ideas about Access control, Door locks and B

325 best Access Control images on Pinterest | Access control, Remote
Explore Waard om te kopen's board "Access Control" on Pinterest. | See more ideas about Access control, Remote and Buy n

An administration concept for the enterprise role-based access control
Jun 2, 2003 - Using an underlying role-based model for the administration of roles has proved itself to be a successful

Access Control
Security. ACM Comput. Surv. 13(3): 247-278 (1981). – See references to other optional papers throughout slides. • Ro

Trust-based Application Grouping for Cloud
Nesse modelo, os provedores, com a finalidade de reduzir custos operacionais, oferecer escalabilidade de acordo com a de

The Economic Impact of Role-Based Access Control - NIST
Planning Report 02-1. The Economic. Impact of Role-Based. Access Control. Prepared by: RIT for. National Institute of. S

Guide to Attribute Based Access Control (ABAC) Definition and
Jan 8, 2014 - Certain commercial entities, equipment, or materials may be identified in this document in order to descri

Computer access control - Wikipedia
In computer security, general access control includes identification, authorization, authentication, access approval, an

Thermistor Based Temperature Control Without Microcontroller on
Model No.206:This project is designed to develop a temperature control system using a thermistor. It is helpful ...