[1] 刘彦凯.信息化建设"云计算"如何服务电子政务[J].信息化建设,2011(8):17-19. (LIU Y. How can "Cloud computing" services to e-government[J]. Information Construction, 2011(8): 17-19.) [2] CHEN L, CRAMPTON J. Inter-domain role mapping and least privilege[C]//SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2007: 157-162. [3] SAFFARIAN M, SADIGHI B. Owner-Based Role-Based Access Control OB-RBAC[C]//ARES 2010: Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2010: 236-241. [4] 徐云,肖田元.基于角色映射的跨平台授权研究[J].计算机集成制造系统,2007,13(9):1866-1872. (XU Y, XIAO T Y. Cross-platform research authorization based on role mapping[J]. Computer Integrated Manufacturing Systems, 2007, 13(9): 1866-1872.) [5] XU Z, FENG D, LI L, et al. UC-RBAC: a usage constrained role-based access control model[C]//ICICS 2003: Proceedings of the 5th International Conference on Information and Communications Security, LNCS 2836. Berlin: Springer-Verlag, 2003: 337-347. [6] LIANG Z. A new kind of single sign-on model base on mobile Agent[C]//Proceedings of the 2010 2nd International Conference on Information Engineering and Computer Science. Piscataway, NJ: IEEE, 2010: 1-4. [7] 马增红.基于SAML的统一身份认证和跨域单点登录的设计与实现[D].成都:电子科技大学,2008:12-15. (MA Z H. Design and implementation of unified identity authentication and cross-domain Single Sign-On (SSO) based on SAML [D]. Chengdu: University of Electronic Science and Technology of China, 2008: 12-15.) [8] BAIER D, BERTOCCI V, BROWN K, et al. A guide to claims-based identity and access control: authentication and authorization for services and the Web[M]. 2nd ed. [S.l.]: Microsoft Patterns & Practices, 2013: 187-191. [9] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. (FENG D G, ZHANG M, ZHANG Y, et al. Cloud computing security research[J]. Journal of Software, 2011, 22(1): 71-83.) [10] 李红霞.云计算中身份认证与访问控制管理系统的实现策略研究[D].北京:北京邮电大学,2011:8-12. (LI H X. Research on strategy of implementation of identity authentication and access control management system in cloud computing [D]. Beijing: Beijing University of Posts and Telecommunications, 2011: 8-12.) [11] 曹源.面向跨域联邦环境的身份管理关键技术研究[D].长沙:国防科学技术大学,2013:21-23. (CAO Y. Research of key techniques for identity management in across domains federal environment [D]. Changsha: National University of Defense Technology, 2013:21-23.) [12] ZHANG W, LI Y. Federation access control model based on Web-service[C]//ICEE '10: Proceedings of the 2010 International Conference on E-Business and E-Government. Washington, DC: IEEE Computer Society, 2010: 38-41. [13] STANDARDWORKING O, CAHILL C P, AOL J, et al. Assertions and protocols for the OASIS Security Assertion Markup Language (SAML) V2. 0——errata composite [S/OL]. [S.l.]: OASIS, 2006: 243-247. (2014-03-15) [2015-07-22]. https://lists.oasis-open.org/archives/security-services/200404/pdf00002.pdf. [14] TELNONI P, MUNIR R, ROSMANSYAH Y. SAML single sign-on protocol development using combination of speech and speaker recognition[C]//Proceedings of the 2014 International Conference of Advanced Informatics: Concept, Theory and Application. Piscataway, NJ: IEEE, 2014: 299-304. [15] 张进铎,毛承国,李硕,等. OpenStack开源云平台主模块的架构分析[J].信息技术与信息化,2014(4):17-21. (ZHANG J D, MAO C G, LI S, et al. Main module architecture analysis of OpenStack cloud platform[J]. Information Technology and Informatization, 2014(4): 17-21.) [16] 黄凯,毛伟杰,顾骏杰.OpenStack实战指南[M].北京:机械工业出版社,2014:23-39. (HUANG K, MAO W J, GU J J. OpenStack practical guide[M]. Beijing: China Machine Press, 2014: 23-39.) [17] 汪奕君,张兴元.OpenLDAP中访问控制机制的分析[J].中国科技信息,2005(21):41. (WANG Y J, ZHANG X Y. Analysis of access control mechanism in the OpenLDAP[J]. Journal of Information Science and Technology of China, 2005(21): 41.) [18] OpenStack. OpenStack installation guide for Ubuntu 14.04 [EB/OL]. [2015-03-29]. http://docs.openstack.org/kilo/install-guide/install/apt/content/. |