期刊文献+

以社区域为中心基于信任的访问控制 被引量:2

Community field-centric trust-based access control model
下载PDF
导出
摘要 智能服务agent基于上下文感知的交互与协作为数字社区提供动态服务的同时,也带来了安全访问问题。在综合分析数字社区中agent的信任、社区域内外协作等特征的基础上,提出以社区域为中心基于信任的访问控制模型,即依据agent自身上下文及信任证书建立社区域,其后信任等级随会话动态调整,通过信任等级与信任阈值的匹配关系有效地控制权限的激活和使用。与最新研究成果相比,该模型突出的特点是实现动态权限控制,同时满足社区域内及社区域间角色的安全交互与协作。 Context-aware interaction and cooperation among agents provids digital community services. However, it also brings new problems of secure access. A novel community field-centric trust-based access control model (referred to as the CTBAC) was developed by thoroughly considering both the trust level of agent and the cooperation among agents in- side and outside of community fields in digital community. There are two novel ingredients. Firstly, a community field was established in terms of agent's own contexts and trust certificate. Thus, the trust level could be dynamically adjusted based on the sessions. Secondly, the activation and use of access control permissions according to the match relationship between the trust level of agents and trust threshold. The proposed CTBAC model was compared to several access con- trol models and its effectiveness in both dynamic permission control and security protection was demonstrated.
出处 《通信学报》 EI CSCD 北大核心 2013年第9期1-9,共9页 Journal on Communications
基金 长江学者和创新团队发展计划基金资助项目(IRT1078) 国家自然基金委员会-广东联合重点基金资助项目(U1135002) 国家自然科学基金资助项目(61370078) 国家科技部重大专项基金资助项目(2011ZX03005-002) 中央高校基本科研基金资助项目(JY10000903001) 福建省自然科学基金资助项目(2011J01339)~~
关键词 数字社区 智能体 信任 协作 访问控制 digital community agent trust cooperation access control
  • 相关文献

参考文献25

  • 1JUNG Y, JOSHI J B D. CRiBAC: community-centric role interaction based access control model[J]. Computers & Security, 2012, 31(4): 497-523.
  • 2KUMAR M, SHIRAZI B A, DAS S K, et al. PICO: a middleware framework for pervasive computing[J]. IEEE Pervasive Computing, 2003, 2(3):72-79.
  • 3JUNG Y, KIM M. Situation-aware community computing model for developing dytmmic ubiquitous computing systems[J]. Journal of Universal Computer Science, 2010, 16( 15):2139-2174.
  • 4SANDHU R S, COYNE E J, FEINSTEIN H L. Role-based accesscontrol models[J]. IEEE Computer, 1996, 29(2):38-47.
  • 5JUNG Y, KIM M, MASOUMZADEH A, et al. A survey of security issue in multi-agent systems[J]. Artificial Intelligence Review, 2012, 37(3):239-260.
  • 6JUNG Y, MASOUMZADEH A, JOSHI J B D, et al. RiBAC: role interaction based access cona'ol model for community computing[A]. Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collabo- rateCom'08)[C]. Orlando, FL, USA, 2009, 10(3):304-321.
  • 7郎波.面向分布式系统访问控制的信任度量化模型[J].通信学报,2010,31(12):45-54. 被引量:17
  • 8BHATTI R, BERTINO E, GHAFOOR A. A trust-based context-aware access control model for web-services[J]. Distributed and Parallel Da- tabases, 2005,18(1):83-105.
  • 9朱友文,黄刘生,陈国良,杨威.分布式计算环境下的动态可信度评估模型[J].计算机学报,2011,34(1):55-64. 被引量:25
  • 10ILTAF N, GHAFOOR A, HUSSAIN M. Modeling interaction using trust and recommendation in ubiquitous computing environment[J]. EURASIP Journal on Wireless Communications and Networking, 2012,(1):1-13.

二级参考文献116

共引文献139

同被引文献24

  • 1倪德忠.油气井射孔层位的深度定位方法[J].海洋石油,2004,24(2):88-92. 被引量:4
  • 2Tolone W, Ahn G J, Pai T, et al. Access control in collaborative systems [J]. ACM Computing Surveys, 2005, 37(1) 29-41.
  • 3Thomas R K. Team-based access control (TMAC) : A primitive for applying role-hased access controls in collaborative environments [C] //Proc of the 2nd Workshop on Role-Based Access Control. New York: ACM, 1997: 13- 19.
  • 4Thomas R K, Sandhu R S. Task-based authorization controls (TBAC): A family of models for active and enterprise- oriented authorization management [C] //Proe of the IFIP WGll. 3 Workshop on Database Security. London: Chapman & Hal, 1997:13-19.
  • 5Oh S, Park S. Task-role based access control (T-RBAC): An improved access control method for enterprise environment [G] //LNCS 1873 : Proe of the 11th Int Conf on Database and Expert Systems Applications. Berlin Springer, 2000: 264-273.
  • 6Sandhu R S, Coynek E J, Feinsteink H L, et al. Role-based access control models [J]. IEEE Computer, 1996, 29 (2) : 38-47.
  • 7Georgiadis C K, Mavridis I, Pangalos G, et al. Flexible team-based access control using contexts [C] //Proc of the ACM Symp on Access Control Models and Technologies. New York: ACM, 2001:21-27.
  • 8Bijon K Z, Sandhu R S, Krishnan R. A group-centric model for collaboration with expedient insiders in multilevel systems [C] //Proc of the 2012 Int Conf on Collaboration Technologies and Systems. Piscataway, NJ: IEEE, 2012: 419-426.
  • 9Bell D E, LaPadula L J. Secure computer system: Unified exposition and multics interpretation, MTR-2997 [R]. Bedford, CA: MITRE Corporation,1976.
  • 10Goguen J A, Meseguer J. Security policies and security models [C] //Proc of the 1982 IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1982: 11-20.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部