|
计算机科学 2007
Access Control Model for CSCW System and Implementation Based on Trusted Computing Technology
|
Abstract:
Access control policies and models available lack of temporal characteristic, and do not well solve the question of identity disguise and cheat in open network, as well as platform trustworthy question effecting on security policies integrity enforcement. This paper presented an role-activity-based access control with time-dependent and constraints features for CSCW, called as Fine-grained Access Control for CSCW, which could define more precise security policies; Trusted Computing-enabled Access Control architecture and key policies dissemination and enforcement protocols are addressed. The method constructs CSCW trustworthy access control platform and strengthens cooperative entity identification, through creating integrated cooperative entity-CSCW platform-application trustworthy chain, as well as easing centralized policy server using partial related policies distribution and integrity enforcement in local workstation.