全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Access Control Model for CSCW System and Implementation Based on Trusted Computing Technology
CSCW系统访问控制模型及其基于可信计算技术的实现

Keywords: Computer supported cooperative work,Access control,Trusted computing,Trusted platform module,Policy dissemination
CSCW
,访问控制,可信计算,TPM,策略分发

Full-Text   Cite this paper   Add to My Lib

Abstract:

Access control policies and models available lack of temporal characteristic, and do not well solve the question of identity disguise and cheat in open network, as well as platform trustworthy question effecting on security policies integrity enforcement. This paper presented an role-activity-based access control with time-dependent and constraints features for CSCW, called as Fine-grained Access Control for CSCW, which could define more precise security policies; Trusted Computing-enabled Access Control architecture and key policies dissemination and enforcement protocols are addressed. The method constructs CSCW trustworthy access control platform and strengthens cooperative entity identification, through creating integrated cooperative entity-CSCW platform-application trustworthy chain, as well as easing centralized policy server using partial related policies distribution and integrity enforcement in local workstation.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133