欢迎来到天天文库
浏览记录
ID:36419397
大小:6.72 MB
页数:136页
时间:2019-05-10
《制造网格安全技术的研究与实现》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、上海大学博士学位论文制造网格安全技术的研究与实现姓名:蔡红霞申请学位级别:博士专业:机械制造及其自动化指导教师:方明伦;俞涛20071001上海大学博士学位论文用纸(Role.basedAccessControl,RBAC),采用节点粗粒度、全局细粒度的访问控制策略,根据任务中需要的服务对应的执行组织机构及任务状态动态调整用户的可执行服务,最终在服务节点做出授权决策。全局细粒度的访问控制策略制定考虑了制造网格资源属性特征及基于服务层次关系的权限继承。节点粗粒度的访问控制策略基于节点和制造网格域的信任值的评估。采用两层角色管理分离了制造网格业务角色和系
2、统角色,提出了任务.角色模型解决动态制造网格环境中的业务角色管理问题。最后,对本文研究内容进行了开发和实现,并通过在上海大学制造网格试验床中典型应用实例的试验性应用,验证了制造网格安全系统实施的可行性,获得了很多有价值的经验,为制造网格进一步完善和推广实施奠定了坚实的基础。关键词:制造网格,安全体系,本体论,动态组织,身份认证,访问控制,授权策略,信任,角色管理II上海大学博士学位论文用纸AbstractBasedontheNetworkedManufacturing(NM),withOpenGridServiceArchitecture(OGSA)
3、asthesystemframework,andGlobusToolkitasthedevelopingtools,somespecificationsasstandard,ManufacturingGrid(MG)istheapplicationofGridtechnologyinthemanufacturingfieldtorealizetheresourcesharingandcollaborativeworking.However,fortheMQwiththetrendtowardstheapplicationofbusiness,thes
4、ecurityisbecomingmoreandmoreimportant.ItisdifjficultfortheMGtocomeintoapplicationbecauseofdoubtofsecurity.Therefore,thereliableandextensivesecurityarchitectureissignificantfortheMQbecauseitisthesafeguardfortheMGWithoutthestrongMGsecurityarchitecture,itisimpossiblefortheMGtocome
5、intobusiness.Whilesharingisputemphasison,thesecurityisignoredintheearlyphaseoftheInteract.Nowdays,theGridhasencountedthesameproblem.TheGridSecurityArchitecturehasnotbeenperfectenoughtomeetthereality.Moreover,theMGiSmorecomplicatedthanthecomputingGrid,SOtheGridSecurityArchitectu
6、recouldnotsarisfytheMG’Srequirementofsecurity.Therefore.itiSnecessaryforUStodosomeresearchWOrkonthesecurityofMGwhenwearedevelopingtheMGsystem.BasedonOntology,thisdissertationproposedtheOntologybasedManufacturingGridModelforSecurity(OBMGMS)toabstractandsynthesizetheconceptandthe
7、relationshipinthefieldofMGsecurity.In0BMGMS.itintroducesthecharacterofdistributedorganizationcomposedbytheunitandcellinMGTheunitiStask.centeredandthecelliStheorganizationwhichprovidestheservice.Resourcesarevariouswithdifferentcharactersandrelatedwithdifferentoperations.Therefor
8、e,theyshouldbedefineddifferentsecuritylevel.IntheMGthe
此文档下载收益归作者所有