Skip to main content

Optimized Roles Set Algorithm in Distributed Parallel Computing System

  • Conference paper
Parallel Computational Fluid Dynamics (ParCFD 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 405))

Included in the following conference series:

  • 3466 Accesses

Abstract

With the rapid development of computer technology, distributed computing and parallel computing have made great progress. Distributed parallel computing system is a combination of distributed computing and parallel computing, which can provide fast solutions to information sharing and subtasks in high-speed network environment. In this paper, we propose a new access control model-Distributed Parallel Computing Role Based Access Control (DPCRBAC) Model on the basis of the traditional RBAC model. We propose a new roles set assignment algorithm-Optimized Roles Set (ORS) algorithm. According to the results of simulation, the proposed algorithm ORS can effectively improve the efficiency roles and is effective in reducing role conflicts in the process of role assignment, and ensure the safety and reliability of the distributed parallel computing system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tanenbaum, A.S., Van Steen, M.: Distributed Systems:Principles and Paradigms, pp. 1–2. Prentice-Hall, Inc. (2002)

    Google Scholar 

  2. Karger, P.A.: Authentication and discretionary access control in computer networks. Computer Networks and ISDN Systems 10(1), 27–37 (1985)

    Article  MathSciNet  Google Scholar 

  3. Thomas, T.A.: Mandatory Access Control Mechanism for the Unix File System. In: Marshall, A. (ed.) Proceedings of the 4th Aerospace Computer Security Applications Conference, pp. 173–177 (1988)

    Google Scholar 

  4. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  5. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3), 224–228 (2001)

    Article  Google Scholar 

  6. Sun, Y., Meng, X., Liu, S., Pan, P.: Flexible workflow incorporated with RBAC. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barthès, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol. 3865, pp. 525–534. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security 2(1), 65–104 (1999)

    Article  Google Scholar 

  8. Thomas, R., Sandhu, R.: Towards A Task-Based Paradigm for Flexible and Adaptable Access Control in Distributed Applications. In: Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshops, pp. 138–142 (1993)

    Google Scholar 

  9. KapadiaA: I-RBAC 2000: A Dynamic Role Translation Model for Secure Interoperability (2001)

    Google Scholar 

  10. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Trans. Information and System Security 4(3), 191–233 (2001)

    Article  Google Scholar 

  11. Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role Based Access Control Model. IEEE Trans. Knowledge and Data Eng. 17(1), 4–23 (2005)

    Article  Google Scholar 

  12. Liu, Y., Zhuo, T., Renfa, L.: Roles query algorithm in cloud computing environment based on user require. Journal on communications 32(7), 169–175 (2011)

    MATH  Google Scholar 

  13. Joshi, J.B.D., Bertino, E., Ghafoor, A., et al.: Formal Foundation for Hybrid Hierarchies in GTRBAC. ACM Transactions on Information and System Security (TISSEC) 10(4), 1–39 (2008)

    Article  Google Scholar 

  14. Sun, Y., Wang, Q., Li, N., Bertino, E., Atallah, M.J.: On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Sec. Comput. 8(6), 883–886 (2011)

    Article  Google Scholar 

  15. Tang, Z., Li, R., Lu, Z.: Request-Driven Role Mapping Framework for Secure Interoperation in Multi-Domain Environments. International Journal of Computer Systems Science and Engineering 23(3), 193–200 (2008)

    MATH  Google Scholar 

  16. Tang, Z., Wei, J., Li, K., Li, R.: An Access Control Model in Cloud Computing Environment based RBAC. In: The 7th International Conference on Grid and Pervasive Computing, Hong Kong, pp. 11–13 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, W., Tang, Z. (2014). Optimized Roles Set Algorithm in Distributed Parallel Computing System . In: Li, K., Xiao, Z., Wang, Y., Du, J., Li, K. (eds) Parallel Computational Fluid Dynamics. ParCFD 2013. Communications in Computer and Information Science, vol 405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53962-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53962-6_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53961-9

  • Online ISBN: 978-3-642-53962-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics