期刊文献+

基于信任度和协作安全策略的委托模型

Delegation Model Based on Trust Degree and Secure Strategy of Collaboration
下载PDF
导出
摘要 为提高委托过程的可信度并保证系统的安全性,提出一种基于信任度和协作安全策略的委托模型。利用信任资历、信任经验和信任推荐综合计算不同用户的信任度,选取值得信任的受托对象,采用互斥角色约束间接实施协作分工策略的方法,进一步选取保证系统安全性的受托对象。理论分析与应用实例证明,与现有模型相比,该模型通过量化计算信任度及最小约束构造算法确定的受托用户能够较好地体现委托的可靠性,并且满足系统状态的安全性要求。 In order to enhance reliability in delegations and ensure system security, this paper proposes a delegation model based on trust degree and secure strategy of collaboration. Trust qualifications, trust experiences and trust recommendations are utilized to comprehensively compute trust values, and trustworthy candidates with higher values are chosen. Mutually exclusive role constraints are adopted to indirectly enforce division policy of collaboration, and the most appropriate delegate is chosen in the secure collaborative environment. Compared with existing models, theoretical analyses and experimental results show that the model can efficiently reflect reliability in delegations, and it satisfies requests of system security.
作者 孙伟 汪磊
出处 《计算机工程》 CAS CSCD 2013年第4期146-150,共5页 Computer Engineering
基金 河南省教育厅科学技术研究基金资助重点项目(13A520765) 河南省信息技术教育研究基金资助项目(ITE12192)
关键词 委托 信任度 协作分工策略 信任资历 信任经验 信任推荐 delegation trust degree policy of collaboration division trust qualification trust experience trust recommendation
  • 相关文献

参考文献10

二级参考文献58

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2王东安,张方舟,南凯,阎保平.网格计算中基于信任度的访问控制研究[J].计算机应用研究,2006,23(6):49-51. 被引量:6
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Tolone W J, Ahn G J, Pal T. Access Control in Collaborative Systems. Technical Report. UNC Charlotte :SIS Department, 2002
  • 5Bhatti R , Bertino E. A Framework for Role -- Based Access Control in Group Communication Systems//Proceedings of the Second IEEE International Symposium on Network Computing and Applications. 2003 : 562-569
  • 6Sandhu R, Samarati P. Access control: Principles and practice. IEEE Communications, 1994,9 : 40-48
  • 7Sandhu R, Coyne RS, Feinstein EJ, et al. Role-based access control models. IEEE Computer, 1996, 29(2) : 38-47
  • 8Thomas R, Sandhu R. Task - based authorization controls (TBAC) : a family of models for active and enterprise-oriented authorization management //11th IFIP Working Conference on Database Security. Lake Tahoe Califorttia, August 1997: 166- 181
  • 9Thomas R. Team-based access control (TMAC)//Proceedings of 2nd ACM Workshop on Role-Based Access Control. Fairfax, VA,1997:13-19
  • 10Bullock A, Benford S. An access control framework for multiuser collaborative environments//ACM GROUP. Phoenix, AZ, 1999:140-149

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部