期刊文献+

开放系统中基于信任度和上下文的访问控制模型

A Trustworthiness-and Context-Based Access Control Model for Open Systems
下载PDF
导出
摘要 开放系统中,访问控制机制不仅要能处理数量庞大且身份无法预先确定的用户的访问请求,而且能充分反映用户访问请求时上下文环境信息。本文提出了一种基于信任度和上下文的访问控制模型TC-RBAC,并给出了用户信任度计算方法。通过信任度为未知身份用户分配合适角色,上下文约束实现了对不同的访问请求上下文信息做出不同授权决策,从而满足开放环境下访问控制的设计要求。 The access control mechanism in open systems can not only respond to the access requirement of a large amount of users whose identities are not recognizable in advance, but also reflect context information in user's access requirements. We propose a trustworthiness- and context-based access control model (TC-RBAC) and give a method of evaluating the trustworthiness of users. By means of trustworthiness, the applicable roles are assigned to the users whose identities are not recognizable in advance. Besides, context constraint contributes to the decisions of authorization according to context information in user's access requirements. These satisfy the design demands of the access control mechanism in open systems.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第1期101-106,共6页 Journal of East China University of Science and Technology
基金 国家自然科学基金(60473055 60773094) 上海市曙光计划项目(07SG32)
关键词 信任度 上下文 角色 访问控制 开放系统 trustworthiness context role access control open systems
  • 相关文献

参考文献9

  • 1Perraiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 2Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C]//Proceedings of the 17th IEEE Symposium on Security and Privacy.Oakland,California,USA:IEEE Computer Society Press,1996.164-173.
  • 3Internet Society Network Working Group RFC 2704.The Key-Note trust management system version 2[S].
  • 4Li N H,Winsborough W H,Mitchell J C.Distributed credential chain discovery in trust management[J].Journal of Computer Security,2003,11(1):35-86.
  • 5Li N H,Mitchell J C.RT:A role-based trust management framework[C]//Proceedings of the 3rd DARPA Information Survivability Conference and Exposition.Washington:IEEE Computer Society Press,2003:201-212.
  • 6Bhatti R,Bertino E,Ghafoor A.A trust-based context-aware access control model for web services[C]//Proceedings of the 3rd IEEE International Conference on Web Services.San Diego,California,USA:IEEE Computer Society Press,2004:184-191.
  • 7Bhatti R,Joshi J B D,Bertino E,et al.X_GTRBAC admin:A decentralized administration model for enterprise wide access controI[C]//Proceedings of the 9th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2004:78-86.
  • 8Chakraborty S,Ray I.TrustBAC-Integrating trust relationships into the RBAC model for access control in open systems[C]//Proceedings of 11th ACM Symposium on Access Control Models and Technologies.Lake Tahoe,California,USA:ACM Press,2006:49-58.
  • 9Kiczales G,Lamping J,Mendhekar A,et al.Aspect-oriented programming[C]//Proceedings of the 11th European Conference on Object-Oriented Programming.Berlin:Springer-Verlag,1997:220-242.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部