期刊文献+

普适计算环境下基于信任的模糊访问控制模型 被引量:2

Trust-based fuzzy access control model in pervasive computing
下载PDF
导出
摘要 基于角色的访问控制模型(RBAC)被普遍认为是当前最具有发展潜力的访问控制策略,已成为信息安全等领域研究的热点之一。然而传统的RBAC模型不能完全适合普适计算环境下的访问控制。在传统RBAC模型的基础上引入信任管理技术,提出了基于信任的模糊访问控制模型(TBAC)。通过区间值模糊理论实现对主体信任度进行评估,依据请求访问主体的信任度所属信任域设置访问控制策略,对于信任值和可靠性高的主体可以划分到比较高的信任域中,访问控制中的角色指派则可以将某一个信任域指派到角色集的一个角色上,从而实现由主体到角色的指派,更加适合普适计算环境下的访问控制要求。 Role-Based Access Contro(lRBAC) has been generally accepted as one of the most promising access control policies, and it has become a hot research topic in information security area.However,traditional RBAC model is not completely fit for the access control in pervasive computing environment.In this paper,trust management technology is introduced on the basis of traditional access control model and the trust-based access control model in pervasive computing (TBAC) is proposed.It evaluates the trust degree of subjects according to interval-valued fuzzy theory and the access control policy is made by the trust level oi the subjects who request to access.The subjects with higher trust degree and reliability are classified into higher trust level,and then the role-assign procedure assigns the trust level to a corresponding role.So it meets the requirements of pervasive computing environment better.
作者 张海娟
机构地区 西北大学 安康学院
出处 《计算机工程与应用》 CSCD 北大核心 2009年第27期107-112,139,共7页 Computer Engineering and Applications
基金 陕西省教育厅专项基金资助课题No.08JK207 安康学院专项科研计划资助项目No.2006AKXY010~~
关键词 普适计算 访问控制 信任度 角色 模糊综合评判法 模糊聚类 pervasive computing access control trust degree role fuzzy synthetic judgment method fuzzy clustering
  • 相关文献

参考文献25

  • 1Weiser M.The computer for the twenty-first century[J].Scientific American, 1991,265(3):94-104.
  • 2Weiser M.Some computer science issues in ubiquitous computing[J]. ACM, 1993,36(7 ) : 75-84.
  • 3Sakanaura K,Koshizuka N.The etron wide-area distributed-system architecture for Ecommerce[J].IEEE Micro, 2001,21 (6) : 7-12.
  • 4Zhang D,Chen E,Shi YC,et al.A kind of smart space for remote real-time interactive learning based on pervasive computing model [J].Lecture Notes in Computer Science,2003,2783:297-307.
  • 5栗阳,关志伟,戴国忠,任向实,韩勇.A Context—Aware Infrastructure for Supporting Applications with Pen—Based Interaction[J].Journal of Computer Science & Technology,2003,18(3):343-353. 被引量:5
  • 6Shand B,Dimmock N,Bacon J.Trust for ubiquitous,transparent collaboration[J].Wireless Network,2004,10(6) :711-721.
  • 7Adams C,Farrell S.Request for Comments (RFC) 2510 Internet x. 509 public key infrastructure certificate management protocols[S]. Internet Engineering Task Force, 1999.
  • 8Feigenbaum J,Blaze M,Lacy J.Decentralized trust management[C]// Proceedings of the 1996 IEEE Symposium on Security and Privacy.Washington : IEEE Computer Society, 1996:164-173.
  • 9Blaze M,Feigenbaum J, Keromytis A D.Trust management for public-key infrastructures[J].Lecture Notes in Computer Science,1999, 1550:59-63.
  • 10Chu Y H,Feigenbaum J,LaMacchia B,et al.Trust management for web applications[J].Computer Networks and ISDN Systems, 1997, 29(8-13 ) :953-964.

二级参考文献28

  • 1Landay J A, Myers B A. Extending an existing user interface toolkit to support gesture recognition. In Proc.INTERCHI'93, Amsterdam, Netherlands, ACM, Apr.24-29, 1993, pp.91-92.
  • 2Mankoff J, Hudson S E, Abowd G D. Providing integrated toolkit-level support for ambiguity in recognition-based interfaces. In Proc. CHI'00 Human Factors in Computing Systems, Hague, Netherlands,ACM, Apr. 1-6, 2000, pp.368-375.
  • 3Carr R, Sharer D. The Power of PenPoint. Addison-Wesley, 1991.
  • 4Sukaviriya P, Foley J D. Coupling a UI framework with automatic generation of context-sensitive animated help. In Proc. UIST'90 Symposium on User Interface Software and Technology, Snowbird, UT, ACM, Oct. 3-5, 1990, pp.152-166.
  • 5Farrell R, Fairweather P, Breimer E. A task-baaed architecture for application-aware adjuncts. In Proc. IUI'00 International Workshop on Intelligent User Interfaces,New Orleans, LA, ACM, Jan. 9-12, 2000, pp.82--85.
  • 6Herstad J, Thanh D V, Audestad J A. Mobile communication and interaction in context. In Proc. IUI'99 International Workshop on Intelligent User Interfaces,Redondo Beach, CA, ACM, Jan. 5-8, 1999, p.198.
  • 7Budzik J, Hammond K J. User interactions with every-day applications as context for just-in-time information access. In Proc. IUI'00 International Workshop on Intelligent User Interfaces, New Orleans, LA, ACM, Jan.9-12, 2000, pp.44-51.
  • 8Carenini G, Moore J D. Generating explanations in context. In Proc. IUI'93 International Workshop on Intelligent User Interfaces, Orlando, FL, ACM, Jan. 4-7,1993, pp.175-182.
  • 9Dey A K, Abowd G D, Wood A. CyberDesk: A framework for providing self-integrating context-aware services. In Proc. IUI'98 International Workshop on Intelligent User Interfaces, San Francisco, CA, ACM, Jan.6-9, 1998, pp.47-54.
  • 10Hirashima T, Matsuda N, Nomoto T, Toyoda J.Context-sensitive filtering for browsing in hypertext. In Proc. IUI'98 International Workshop on Intelligent User Interfaces, San Francisco, CA, ACM, Jan. 6-9,1998, pp.119--126.

共引文献29

同被引文献21

  • 1张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 23GPP TS 23. 228 ,V. 8.2.0. IP Multimedia Subsystem (IMS) [S]. 2007.
  • 3Want R, Borriello G, Pering T, et al. Disappearing hardware [J]. IEEE Pervasive Computing,2002,1 ( 1 ) :36-47.
  • 4Satyanaryanan M. Pervasive Computing:Vision and Challenges [J]. IEEE Personal Communications,2001,8 (4) : 10-17.
  • 5Larsen K L, Matthiesen E V, Schwefel H P, et al. Optimized Macro Mobility within the 3GPP IP Multimedia Subsystem [C]. [s. l. ]:[s.n. ] ,2006.
  • 6Hosmer H H. Security is fuzzy:applying the fuzzy logic paradigm to the mutipolicy paradigm [ C ]//Proceedings of the ACM Workshop on New Security Paradigms 1993 : 175 - 187.
  • 7Bacon J, Moody K, Yao W. A model of OASIS role-based access control and its support for active security[ J ]. TISSEC ,2002 ,5 (4) :492 - 540.
  • 8Ovchinnikov S. Fuzzy sets and secure computer system[ C 1//Proceeding of the IEEE Workshop on Computer and System Security. IEEE Press, 2002:81 - 86.
  • 9Joshi James B. D. , Bertino E. , Latif U. , et al. A generalized temporal role-based access control model [ J ]. IEEE Trans on Knowledge and Data Engineering,2005,17 ( 1 ) :4 - 23.
  • 10Wang H-F, Huang Zhi-hao. Top-down fuzzy decision making with partial preference information [ J ]. Fuzzy Optimization and Decision Making, 2002,1 (2) :161 - 176.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部