Meng Teng
National University of Defense Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Meng Teng.
international conference on information security | 2004
Gang Yin; Huai-min Wang; Dianxi Shi; Yan Jia; Meng Teng
In this paper, we concentrate on the delegation problem in trust management (TM) systems. One key point for delegation models is to find the balance between flexibility and controllability. Delegation models in existing TM systems usually have no effective control over delegated privileges or try to enforce too strict constraint on delegation that raises difficulty in policy definition and computational-model constructing. We propose a role-based constrained delegation Model called RCDM04, which is a constrained extension of current role-based trust management systems. RCDM04 comprises a novel delegation framework for multi-centric authorization and proxy-based authentication, proposing to use trusted scope and delegation depth to control the propagation of delegated privileges. This paper also introduces a rule-based language for specifying and enforcing the policies in the model.
international symposium on parallel and distributed processing and applications | 2004
Gang Yin; Meng Teng; Huaimin Wang; Yan Jia; Dianxi Shi
In this paper, we distinguish between authorization problems at management level and request level in open decentralized systems, using delegation for flexible and scalable authorization management. The delegation models in existing approaches are limited within one level or only provide basic delegation schemes, and have no effective control over the propagation scope of delegated privileges. We propose REAL, a Role-based Extensible Authorization Language framework for open decentralized systems. REAL covers delegation models at both two levels and provides more flexible and scalable authorization and delegation policies while capable of restricting the propagation scope of delegations. We formally define the semantics of credentials in REAL by presenting a translation algorithm from credentials to Datalog rules (with negation-as-failure). This translation also shows that the semantics can be computed in polynomial time.
Archive | 2011
Shuqiang Yang; Rongling Luo; Huaimin Wang; Quanyuan Wu; Yan Jia; Bin Zhou; Weihong Han; Meng Teng; Zhikun Chen; Hui Zhao; Songchang Jin; Qi Shu; Kai Wang
Archive | 2010
Dianxi Shi; Wei Zhang; Huaimin Wang; Bo Ding; Hui Liu; Gang Yin; Meng Teng; Yongzhi Yang; Xiang Rao
Archive | 2011
Shuqiang Yang; Meng Teng; Huaimin Wang; Quanyuan Wu; Yan Jia; Bin Zhou; Weihong Han; Zhikun Chen; Hui Zhao; Qi Shu; Songchang Jin; Rongling Luo; Kai Wang
Archive | 2011
Shuqiang Yang; Hui Zhao; Huaimin Wang; Quanyuan Wu; Yan Jia; Bin Zhou; Weihong Han; Meng Teng; Zhikun Chen; Songchang Jin; Rongling Luo; Kai Wang; Qi Shu
Archive | 2011
Shuqiang Yang; Kai Wang; Huaimin Wang; Quanyuan Wu; Yan Jia; Bin Zhou; Weihong Han; Meng Teng; Zhikun Chen; Hui Zhao; Songchang Jin; Rongling Luo; Qi Shu
Archive | 2012
Huaimin Wang; Xiang Rao; Dianxi Shi; Yongzhi Yang; Wei Zhang; Bo Ding; Gang Yin; Hui Liu; Meng Teng
Archive | 2011
Meng Teng; Shuqiang Yang; Huaimin Wang; Quanyuan Wu; Yan Jia; Bin Zhou; Weihong Han; Qi Shu; Hui Zhao; Zhikun Chen; Songchang Jin; Rongling Luo; Kai Wang
Archive | 2012
Huaimin Wang; Gang Yin; Dianxi Shi; Yanxu Zhu; Xiang Li; Meng Teng; Bo Ding; Hui Liu; Lin Yuan; Tao Wang