期刊文献+

基于用户信任的动态多级访问控制模型 被引量:4

Dynamic Multi-level Access Control Model Based on User Trust
下载PDF
导出
摘要 在角色访问控制的基础上,增加用户动态信任级别和静态信任级别,建立一种基于用户信任的动态多级访问控制模型。该模型通过用户的静态信任值和角色,获得静态权限,判断用户获得权限的资格,通过用户的动态信任值,判断用户的行为可信性,决定用户在实际访问操作中的具体权限。给出应用实例及模型安全性分析,结果表明该模型能实现动态授权,且满足最小特权原则。 On the basis of Role-based Access Control(RBAC),this paper adds user's static trust level and dynamic trust level,presents a kind of user trust based dynamic multi-level access control model.The model can get static permission according to user static trust value and role,and can judge the user behavior trust and decide the concrete application permissions according to user dynamic trust value in the process of user accessing resource.It gives the application example and the safety analysis,results show that the model can grant authorization dynamically and meets minor privilege principle.
作者 朱一群
出处 《计算机工程》 CAS CSCD 北大核心 2011年第23期129-131,共3页 Computer Engineering
基金 上海高校选拔培养优秀青年教师科研专项基金资助项目(sdj09015) 上海电机学院科研启动基金资助项目(10C413) 上海电机学院重点学科建设基金资助重点项目(10XKF01)
关键词 静态信任 动态信任 角色访问控制 信任等级 动态授权 static trust dynamic trust Role-based Access Control(RBAC) trust level dynamic authorization
  • 相关文献

参考文献7

  • 1曾璎珞,潘雪增,陈健.基于系统可信度的动态安全访问控制模型[J].计算机工程,2010,36(10):155-157. 被引量:2
  • 2薛静,贺樑,邱萌.一种基于静态和动态信任的普适环境信任模型[J].计算机应用,2009,29(1):149-151. 被引量:1
  • 3张立臣,王小明.普适计算环境下基于信任度的模糊自适应访问控制模型[J].计算机应用研究,2009,26(1):311-313. 被引量:2
  • 4Su Rina, Zhang Yongping, He Zhongkun, et al. Trust-based Fuzzy Access Control Model Research[C]//Proc. of the International Conference on Web Information Systems and Mining. Berlin, Germany: Springer-Verlag, 2009.
  • 5Zhao Lingli, Liu Shuai, Li Junsheng, et al. A Dynamic Access Control Model Based on Trust[C]//Proc. of the 2nd Conference on Environmental Science and Information Application Technology. Wuhan, China: [s. n.], 2010.
  • 6Zhang Laishun. TAAC: A Trust-aware Access Control Model[C]// Proc. of the 2nd International Conf. on Computer Engineering and Technology. Chengdu, China: [s. n.], 2010.
  • 7Xing Hanfa, Cui Bingliang, Xu Lilin. An Mixed Access Control Method Based on Trust and Role[C]//Proc. of IITA-GRS'10. Qingdao, China: [s. n.], 2010.

二级参考文献27

共引文献2

同被引文献40

  • 1Crampton J, Khambhammettu H. Delegation in Role- based Access Control[J]. Intemational Journal of Infor- mation Security, 2008, 7(2): 123-136.
  • 2Alsulaiman F A, Miege A, Saddik A E. Threshold-based Collaborative Access Control(T-CAC)[C]//Proc. of International Symposium on Collaborative Technologies and Systems. Orlando, USA: IEEE Press, 2007.
  • 3Wang Qihua, Li Ninghui, Chen Hong. On the Security of Delegation in Access Systems[C]//Proc. of the 13th European Symposium on Research in Computer Security. London, UK: IEEE Press, 2008.
  • 4Li Ninghui, Bizri Z, Tripunitara M V. On Mutually- exclusive Roles and Separation of Duty[C]//Proc. of the 1 lth ACM Conference on Computer and Communication Security. New York, USA: ACM Press, 2004.
  • 5Yuan E,Tong J.Attributed based access control(ABAC)for web services[C]//IEEE International Conference on Web Services,2005:561-569.
  • 6Kulkarni D,Trinpathi A.Context-aware role-based access control in pervasive computing systems[C]//ACM SACMAT’08,2008:113-122.
  • 7Yan Li,Jinqiang Ren,Huiping Sun,et al.Trust-Risk-Game Based Access Control in Cross Domain Application[J].Communications in Computer and Information Science,2009(29):89-102.
  • 8Tang Zhuo,Zhang Shaohua,Li Kenli,et al.Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk[C]//ISPEC 2010,LNCS 6047,2010:201-216.
  • 9刘伟,蔡嘉勇,贺也平.协同环境下基于角色的细粒度委托限制框架[J].通信学报,2008,29(1):83-91. 被引量:9
  • 10於光灿,李瑞轩,卢正鼎,宋伟,唐卓.协作环境中基于场所的访问控制模型[J].计算机科学,2009,36(1):81-85. 被引量:2

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部