期刊文献+

基于信任的动态访问控制方案 被引量:4

Scheme for Dynamic Access Control Based on Trust
下载PDF
导出
摘要 为有效解决实体间的访问控制问题,应用博弈论方法对基于信任的访问控制模型中的信息博弈和重复博弈进行分析,将博弈理论与信任评估组合应用,设计促使节点间长期诚信访问的约束机制,提出了基于信任的动态访问控制总体方案和相关关键技术策略.安全分析显示,提出的方案是有效且安全的. To effectively solve the problem between entities acess, information games and repeated games in a trust-based access control model were analyzed by applying the method of game theory, and the game theory and trust evaluation were combined. A restriction mechanism of long-term credit access between nodes was designed, and a main scheme of trust-based dynamic access control model and strategies of relatively key technologies were presented. Safety analysis shows that the proposed approach is highly efficient and secure.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2014年第9期1422-1427,共6页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(61272500) 北京市委 市政府重点工作及区县政府应急项目(z131100005613030) 山东省自然科学基金资助项目(ZR2013FQ024) 山东省科学技术发展计划资助项目(2012RKA08002) 山东省高校科技计划资助项目(J12LN70)
关键词 信任 博弈 访问控制 约束机制 策略 trust game theory access control restriction mechanism strategy
  • 相关文献

参考文献11

  • 1BLAZE M,FEIGENBAUM J,LACYL J.Decentralized trust management[C]∥Proc 17th Symposium on Security and Privacy.Oakland:[s.n.],1996:164-173.
  • 2CHAKRABORTY S,RAY I.TrustBAC:integrating trust relationships into the RBAC model for access control in open systems[C]∥Proc 11th ACM Symposium on Access Control Models and Technologies.Lake Tahoe:[s.n.],2006:49-58.
  • 3FENG F,LIN C,PENG D,et al.A trust and context based access control model for distributed systems[C]∥Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications.Washington D.C.:[s.n.],2008:629-634.
  • 4刘武,段海新,张洪,任萍,吴建平.TRBAC:基于信任的访问控制模型[J].计算机研究与发展,2011,48(8):1414-1420. 被引量:30
  • 5HE J S,MA S N,ZHAO B.Analysis of trust-based access control using game theory[J].International Journal of Multimedia and Ubiquitous Engineering,2013,8(4):15-24.
  • 6FudenbergD,TiroleJ.博弈论[M].北京:中国人民大学出版社,2010.
  • 7陈亚睿,田立勤,杨扬.云计算环境下基于动态博弈论的用户行为模型与分析[J].电子学报,2011,39(8):1818-1823. 被引量:38
  • 8罗俊海,范明钰.基于博弈的MANETs信任模型研究[J].计算机研究与发展,2008,45(10):1704-1710. 被引量:6
  • 9MA S N,HE J S,SHUAI X B.An access control method based on scenario trust[J].International Journal of Computational Intelligence Systems,2012,5(5):942-952.
  • 10李俊,孟涛,张立新,易当祥.基于信息熵模糊聚类和粗糙集理论故障的模糊判据研究[J].计算机测量与控制,2011,19(5):1036-1039. 被引量:2

二级参考文献71

共引文献78

同被引文献79

  • 1唐杰,梁邦勇,李涓子,王克宏.语义Web中的本体自动映射[J].计算机学报,2006,29(11):1956-1976. 被引量:98
  • 2沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,2007,27(1):114-117. 被引量:16
  • 3WANG W, ZENG G, TANG D, et al. Cloud'-DLS:dynamic trusted scheduling for cloud computing [J]. Expert Systems with Applications, 2012,39 (3) : 2321-2329.
  • 4YIN Guisheng, WANG Yingjie, DONG Yuxin, et al. Wrig- ht-fisher multi-strategy trust evolution model with white noise for internetware [J]. Expert Systems with Applica- tions, 2013,40(18) : 7367-7380.
  • 5MANAPAT M L, NOWAK M A, RAND D G. Information, irrationality, and the evolution of trust[J]. Journal of Eco- nomic Behavior : Organization, 2013,90 (S) .- $57-$75.
  • 6ROCA C P, CUESTA J A, SA.NCHEZ A. Evolutionary ga- me theory: temporal and spatial effects beyondreplicator dy- namics[J]. Physics of Life Reviews, 2009 (6) : 208-249.
  • 7YU F R, TANG H, BU S, et al. Security and quality of service (QoS)co-design in cooperative mobile ad hoc networks[J]. EUR- ASIP Journal on Wireless Communications and Networking, 2013 (1):1-14. DOI:10. 1186 1487-1499-2013-188.
  • 8GIBBONS R. A primer in game theory[M3. New York,N. Y. , USA : Wheatsheaf, 1992.
  • 9李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 10鲍翊平,张维明,姚莉.一种基于本体映射处理推荐信任信息的模型[J].计算机科学,2009,36(6):185-187. 被引量:2

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部