期刊文献+

可信网络连接中一种基于可信度的细粒度授权模型 被引量:4

A Fine-Grained Dynamic Network Authorization Model Based on Trust Level in Trusted Connecting Network
原文传递
导出
摘要 针对可信网络连接架构中所定义的访问控制粒度粗、对于如何评估访问请求者的可信级别,如何实施授权访问没有定义等问题,提出了根据请求者的行为及其平台计算环境特征评估其信任级别的方法,研究了具有反馈功能的动态访问授权模型,并在构建可信网络连接原型系统的基础上,实现了从连接到授权的接入控制和动态调整. According to the fact that there are some problems existing in the current trusted connecting network architecture such as network access control is coarse-grained and the lack of definition of how to evaluate the trust level of the access requestor and no authorization methods available,the author proposed a method of evaluating the trust level of the access requestor by its behavior and the states of its computing platform environment,and a dynamic network access control and authorization method was studied.On the basis of implementing,the prototype system of the trusted network connecting,dynamic control and adjustment from the beginning of the connecting phase to the authorization phase of the access requestor's endpoint to the trusted network is carried out.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2010年第2期147-150,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60673071 60970115) 国家高技术研究发展计划(863)项目(2006AA01Z442 2007AA01Z411)
关键词 可信计算 可信网络连接 可信度 访问授权模型 trusted computing trusted network connecting trust level network access control and authorization model
  • 相关文献

参考文献8

二级参考文献65

共引文献376

同被引文献42

  • 1周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:29
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 4曹春,马晓星,吕建.SCoAC:一个面向服务计算的访问控制模型[J].计算机学报,2006,29(7):1209-1216. 被引量:6
  • 5腾名鑫 熊忠阳 张玉芳.BP改进算法综述.计算机科学,2008,35(4):237-239.
  • 6TAVALLAEE M, BAGHERI E, LU Wei, et al. A detailed analysis of the KDDCUP99 data set[C]//Proc of IEEE Symposium on Computational Intelligence in Security and Defense Applications. Ottawa:IEEE Computer Society, 2009: 53-58.
  • 7Bammigatti P H.GenericWA-RBAC:role based access control model for web applications[C].Proceedings of the 9th Interna- tional Conference on Information Technology.Bhubaneswar, In- dia:IEEE Computer Society,2006:237-240.
  • 8Dong L, Yu S, Quyang K. The dynamic endpoint based access control model on VPN[C]. Proceedings of the International Con- ference on Networking,Architecture,and Storage.Guilin,China: IEEE Computer Society,2007:44-54.
  • 9Takabi H,Amini M,Jalili R.Enhancing role-based access control model through fuzzy relations[C].Proceedings of the Third Inter- national Symposium on Information Assurance and Security. Manchester, UK:IEEE Computer Society,2007:131-136.
  • 10Bertino E, Bonatti P A. TRBAC: a temporal role-based access control model[J].ACM Transactions on Information and System Security,2001,4(3):191-223.

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部