원문정보
초록
영어
P2P(Peer-to-Peer) is a popular model in distributed computing. We present an access control mechanism based on permission delegation in this paper. This mechanism consists of three protocols, i.e. agency discovering protocol, permission delegating protocol and resource access protocol. Firstly, the task initiator decomposes the task into subtasks and chooses other peers in high trust degree with satisfied abilities to accomplish these subtasks. We call these neighbors as task agents. Then task initiator temporarily transfers some necessary permission to subtask agents by means of credit certificate and delegation certificate. Finally, the subtask agents consume resources of resource peers followed access protocol. These protocols are analyzed in Colored Petri-Net, and simulated with CPN Tools.
목차
1. Introduction
2. Problem descriptions
3. Permission delegation mechanisms
3.1. Related definitions
3.2. Agent discovery protocol
3.3. Permission delegation protocol
3.4. Resource access protocol
4. Calculating credit value
4.1. Direct value
4.2. Indirect value
4.3. Total value
5. Protocol analysis in Colored Petri-Net
5.1. The analysis of permission delegation protocol
5.2. The analysis of access control protocol
6. Simulation based on CPN Tools
6.1. Task initiating peer
6.2. Agent peers
6.3. Resource provider peer
7. Conclusions
Acknowledgements
References