期刊文献+

基于信任度的跨域安全访问控制模型研究 被引量:7

Research on trust based access control in cross-domain
下载PDF
导出
摘要 针对多域环境下基于属性的访问控制模型(ABAC)存在的敏感属性泄露等问题,提出了基于信任度的跨域安全访问控制模型(CD-TBAC)。该模型将属性管理系统与域决策系统相结合,对属性进行敏感度划分,并引入基于时间衰减性的动态信任度度量机制。通过判别信任度与敏感度之间的关系来决定是否提交敏感属性,并结合实时的信任度与主体的某些属性确定角色,最终根据访问控制策略确定主体权限,实现域内外的安全访问。实验和性能分析表明,该模型在效率上完全接近于ABAC,并具备较高的安全性,能防止敏感属性的泄露、实现匿名访问和抗重放攻击等。 Aiming at the existing problems such as sensitive attributes' leakage in the model of attribute based access control( ABAC) for multi-domain,this paper put forword an access control model which was trust based access control in cross-domain( CD-TBAC). The model combined attribute management system with domain decision system,divising the sensitivity degree of subjects' attributes and also introducing dynamic trust metric system based on time decay. By determining the relationship between trust and sensitivity to decide whether to submit sensitive attributes,it also connected real-time trust-value with other attributes to determine the role of the subject. Utimately,the model adopted access control policy to determine the permission,realizing the security access of in-domain and out-domain. The experiment and performance analysis show that this model is completely closed to the ABAC on efficienty,and it has higher security such as preventing the disclosure of sensitive attributes,anonymous access,resisting attack and so on.
出处 《计算机应用研究》 CSCD 北大核心 2016年第6期1791-1796,共6页 Application Research of Computers
基金 河南省科技厅重大科技攻关项目(132102210123) 河南省教育厅重大科技攻关项目(13A520321)
关键词 跨域 信任度 敏感度 时间衰减 敏感属性 角色 cross domain trust sensitivity degree time decay sensitive attributes role
  • 相关文献

参考文献16

  • 1李凤华,苏铓,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. 被引量:127
  • 2Zhu Yan,Ahn G J,Hu Hongxin,et al.Role-based cryptosystem:a new cryptographic RBAC system based on role-key hierarchy[J].IEEE Trans on Information Forensics and Security,2013,8(12):2138-2153.
  • 3Hebig R N,Meinel C,Menzel M,et al.A Web service architecture for decentralised identity and attribute-based access control[C] //Proc of IEEE International Conference on Web Services.2009:551-558.
  • 4Hummer W,Gaubatz P,Strembeck M,et al.An integrated approach for identity and access management in a SOA context[C] //Proc of the 16th ACM Symposium on Access Control Models and Technologies.2011:21-30.
  • 5Yuan E,Tong Jin.Attributed based access control (ABAC) for Web services[C] //Proc of IEEE International Conference on Web Services.2005.
  • 6殷晓玲,夏启寿,王汝传.Web Services中基于信任的动态访问控制[J].计算机应用研究,2011,28(11):4331-4334. 被引量:5
  • 7王浩,吴博,葛劲文,王平.物联网中基于受控对象的分布式访问控制[J].电子科技大学学报,2012,41(6):893-898. 被引量:2
  • 8Liu Songyun,Huang Hejiao.Role-based access control for distributed cooperation environment[C] //Proc of International Conference on Computational Intelligence and Security.2009:455-459.
  • 9李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 10王小明,付红,张立臣.基于属性的访问控制研究进展[J].电子学报,2010,38(7):1660-1667. 被引量:84

二级参考文献163

共引文献271

同被引文献55

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部