%0 Journal Article
%T Access Control Model for CSCW System and Implementation Based on Trusted Computing Technology
CSCW系统访问控制模型及其基于可信计算技术的实现
%A ZHANG Zhi-Yong
%A YANG Lin
%A MA Jian-Feng
%A PU Jie-Xin
%A
张志勇
%A 杨林
%A 马建峰
%A 普杰信
%J 计算机科学
%D 2007
%I
%X Access control policies and models available lack of temporal characteristic, and do not well solve the question of identity disguise and cheat in open network, as well as platform trustworthy question effecting on security policies integrity enforcement. This paper presented an role-activity-based access control with time-dependent and constraints features for CSCW, called as Fine-grained Access Control for CSCW, which could define more precise security policies; Trusted Computing-enabled Access Control architecture and key policies dissemination and enforcement protocols are addressed. The method constructs CSCW trustworthy access control platform and strengthens cooperative entity identification, through creating integrated cooperative entity-CSCW platform-application trustworthy chain, as well as easing centralized policy server using partial related policies distribution and integrity enforcement in local workstation.
%K Computer supported cooperative work
%K Access control
%K Trusted computing
%K Trusted platform module
%K Policy dissemination
CSCW
%K 访问控制
%K 可信计算
%K TPM
%K 策略分发
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=6BB2FE428D8F2F15&yid=A732AF04DDA03BB3&vid=339D79302DF62549&iid=9CF7A0430CBB2DFD&sid=7555FB9CC973F695&eid=CDEBD1ACE0A4C1C1&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=13