首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

面向IaaS架构安全的行为基访问控制技术研究

Acknowledgements第4-5页
Abstract第5-6页
摘要第7-17页
List of Notations and Abbreviations第17-19页
1 Introduction第19-35页
    1.1 Research Overview第19-21页
    1.2 Related Literature第21-23页
        1.2.1 DAC[1]and Cloud Computing第22页
        1.2.2 MAC [2] and Cloud Computing第22页
        1.2.3 RBAC [3] and Cloud Computing第22-23页
        1.2.4 ABAC [4] and Cloud Computing第23页
    1.3 Advanced Access Control Models and their Merit to be Applied for Cloud Computing第23-28页
        1.3.1 RBAC and its Extensions for Cloud Computing第24-27页
        1.3.2 ABAC and its Extensions for Cloud Computing第27-28页
    1.4 Trust and Cloud Access Control第28-30页
        1.4.1 Trust-Based Context-Aware Access Control Model for Web-Services第28-29页
        1.4.2 A Trust Model for Ubiquitous Systems第29-30页
        1.4.3 Other Contributions第30页
    1.5 Research Questions第30-31页
    1.6 Objectives第31-32页
    1.7 Organization第32-35页
        1.7.1 Chapter 2: Preliminaries第32页
        1.7.2 Chapter 3: AR-ABAC: A New Attribute Based Access Control Scheme Supporting Attribute-Rules for Cloud Computing第32-33页
        1.7.3 Chapter 4: TB-AC: Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud第33-34页
        1.7.4 Chapter 5: AC-MAC: Adaptive Cryptographic Cloud Multi-Authority Access Control System第34页
        1.7.5 Chapter 6: Conclusion and Future Extensions第34-35页
2 Preliminaries第35-61页
    2.1 Cloud Computing and Access Control Models第35-43页
        2.1.1 Cloud Computing Access Control Requirements第35-37页
        2.1.2 Cloud Access Control第37页
        2.1.3 Traditional Access Control Models and their Ability to be applied for Cloud第37-43页
    2.2 Attribute-Based Encryption and User Revocation第43-61页
        2.2.1 Secret-Sharing Schemes第44-54页
        2.2.2 Single Authority Attribute-Based Encryption第54-57页
        2.2.3 Multiple Authorities ABE第57-61页
3 Attribute-Rules Attribute Based Access Control第61-83页
    3.1 Introduction第61-64页
    3.2 Formal ABAC Model第64-65页
    3.3 Attribute-Rules ABAC(AR-ABAC)第65-74页
        3.3.1 Flexibility in Attribute Management第66-70页
        3.3.2 Assign and Ease of Privileges第70-74页
    3.4 Implementation and Analysis第74-81页
        3.4.1 Implementation on OpenStack第74-75页
        3.4.2 Experimental Verification第75-78页
        3.4.3 Validation Analysis第78-81页
    3.5 Conclusion第81-83页
4 Multi-Factor Trust-Based Access Control for Cloud第83-119页
    4.1 Introduction第83-87页
        4.1.1 Case Study Scenarios第84-85页
        4.1.2 Motivation第85-86页
        4.1.3 Objectives第86-87页
    4.2 Trust and Proposed Access Control Scheme Strategies第87-92页
        4.2.1 Trust Perspective第87-91页
        4.2.2 Proposed TB-AC Scheme Overview第91-92页
    4.3 Formal Trust第92-106页
        4.3.1 Trust Factors and Relations第92-103页
        4.3.2 Trust Formula and Dynamics第103-106页
    4.4 Trust-Based Access Control(TB-AC)Scheme第106-112页
        4.4.1 User Authentication第108-109页
        4.4.2 Trust Level Calculation第109页
        4.4.3 Adjusting ABAC Access Policies第109-110页
        4.4.4 Blacklisting and Forgiving第110-111页
        4.4.5 User/Subject Authorization第111-112页
    4.5 Implementation and Analysis第112-117页
        4.5.1 Implementation第112页
        4.5.2 Experimental Verification第112-117页
        4.5.3 Validation Analysis第117页
    4.6 Conclusion第117-119页
5 Adaptive Cryptographic Cloud Multi-Authority Access Control System第119-155页
    5.1 Introduction第119-122页
        5.1.1 Motivation第121-122页
        5.1.2 Objectives第122页
    5.2 Scheme Preliminaries第122-125页
        5.2.1 Attribute-Based Encryption第122-125页
        5.2.2 Security Requirements第125页
    5.3 Security Definitions and Security Model第125-127页
    5.4 Adaptive Cryptographic Cloud Multi-Authority Access Control(AC-MAC) Scheme第127-137页
        5.4.1 System Initialization第128-130页
        5.4.2 Multi-Authority Attributes' Trust第130-132页
        5.4.3 Key Generation第132-133页
        5.4.4 Encryption第133-134页
        5.4.5 Decryption第134-137页
    5.5 Proposed AC-MAC Scheme Analysis第137-152页
        5.5.1 Characteristics Analysis第137-138页
        5.5.2 AC-MAC Scheme Implementation第138页
        5.5.3 Communication Overhead第138-140页
        5.5.4 Performance Analysis第140-147页
        5.5.5 Validation Analysis第147-148页
        5.5.6 Security Analysis第148-152页
    5.6 Conclusion第152-155页
6 Conclusion and Future Extensions第155-165页
    6.1 Conclusion第155-157页
    6.2 Proposed Schemes' Relations第157-158页
    6.3 Contributions第158-162页
        6.3.1 AR-ABAC:A New Attribute Based Access Control Scheme Supporting Attribute-Rules for Cloud Computing第158-160页
        6.3.2 TB-AC:Multi-Factor Trust-Based Access Control for Cloud第160-161页
        6.3.3 AC-MAC:Adaptive Cryptographic Cloud Multi-Authority Access Control System第161-162页
    6.4 Future Extensions第162-165页
References第165-173页
Author's Resume and Research Results第173-177页
Degree Thesis Data Set第177页

论文共177页,点击 下载论文
上一篇:材料计算模拟从计算集群到弹性云的迁移研究
下一篇:考虑工作调整、工作绩效和工作满意度的外派管理问题的研究