期刊文献+

开放网络环境中基于动态信任管理的通用访问控制模型 被引量:2

A Generic Access Control Model Based on Dynamic Trust Management in Open Network Environme
原文传递
导出
摘要 综合基于角色的访问控制和信任管理的各自优势,通过引入信任级别概念,文章提出了一个适用于开放式环境的动态信任通用访问控制模型—DTMGAC(Generic Access Control Model Based on Dynamic Trust Management)。模型依据用户身份信任和信任的动态度量,由信任级对角色分配关系实施约束,通过信任级动态调整角色权限分配关系,实现对角色可信授权委托控制。该模型具有良好的自治特性,不仅能细化访问控制粒度,增强系统实用性,而且还能有效降低威胁风险。 A Generic Access Control Model Based on Dynamic Trust Management(DTMGAC) suitable for open network environments is presented which integrates the merits of both RBAC and trust management. It extends the conventional role based access control model with the notion of trust level. Users are assigned to trust levels instead of roles based on dynamically computing a number of factors like user credentials and user behavior history. This model could effectively control the permissions propagation of different sensitivity levels in roles based on the method of restricting privileges in a special trust level range. DTMGAC model is formallly specified and analyzed by automata syntax. This model could make the access control more precise and effectively reduce the threaten risk.
出处 《信息安全与通信保密》 2009年第9期103-106,109,共5页 Information Security and Communications Privacy
基金 国家"863"计划基金资助项目(2008AA01Z404) 国防预研基金资助项目(9140A26010306JB5201)
关键词 访问控制 模型规范 信任关系 行为信任 access control model specification trust realationship trust management
  • 相关文献

参考文献6

  • 1Kagal L, Finin T, Joshi. A Trust-based Security in Pervasive Computing Environments[J]. IEEE Computers, 2001(12) 154-157.
  • 2Yao H, Hu H, Huang B, et al. Dynamic role and context-based access control for grid applications [C]. In: Proc of the 6th Intel Conf on Parallel and Distributed Computing Applications and Technologies. IEEE Computer Society, 2005: 404-406.
  • 3Sandhu R, Coyne E. Role-Based access control models [J]. IEEE Computer, 1996, 29(02) 38-47.
  • 4Joshi J, Bertino E, et al. A generalized temporal role based access control model[J]. IEEE Trans. on Knowledge and Data Engineering, 2005, 17(01) 04-23.
  • 5Butler R, Welch V. A national scale authentication infrastructure[J]. IEEE Computer, 2000, 33(12) 60-66.
  • 6张润莲,武小年.基于PMI的校园网格访问控制研究与应用[J].信息安全与通信保密,2007,29(8):97-99. 被引量:2

二级参考文献4

  • 1[1]Foster I,Kesselman C.The Grid:Blueprint for a New Computing Infrastructure (2nd Edition)[M].Morgan Kaufmann,2004:2~48.
  • 2[2]David CHADWICK.The X.509 Privilege Management Infrastructure[C].Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking,Bled,Slovenia,June 2003:15~25.
  • 3[3]DAVID F,FERRAIOLO,RAVI SANDHU,SERBAN GAVRILA,et al.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001,(4)3:224~274.
  • 4[4]Zhang X W,Oh S,Sandhu R S.PBDM:A flexible delegation model in RBAC[C].In:Proceedings of the 8th ACM Symposium on Access Control Models and Technologies,NewYork,2003:149~157.

共引文献1

同被引文献13

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:932
  • 2张春瑞,徐恪,王开云,姜建国.基于信任向量的P2P网络信任管理模型[J].清华大学学报(自然科学版),2007,47(7):1224-1228. 被引量:12
  • 3BETH T, BORCHERDING M, Klein B. Evaluation of Trust in Open Networks[C]//IEEE.Proc of European Symposium on Research inSecttrity(ESORICS).Berlin: Springer-Verlag, 1994: 03-18.
  • 4JOSANG A. A Logic for Uncertain Probabilities[J]. International Journal of Uncertainty, Fuzziness & Knowledge Based Systems, 2001, 09(03): 279-311.
  • 5ABDUL-RAHMAN A,HAILES S. Supporting Trust in Virtual Communities[A].Maui,Hawaii,2000.
  • 6ABERER K,DESPOTOVIC Z. Managing Trust in a Peer-2-Peer Information System[A].Atlanta,Georgia,2001.
  • 7CORNELLI F,DAMIANI E,VIMERCATI S. Choosing Reputable Servents in a P2P Network[A].2002.
  • 8KAMVAR S,SCHLOSSER M,GARCIA-MOLINA H. The EigeNewTrust Algorithm for Reputation Management in P2P Networks[A].2003.
  • 9蒋德荣,史小宏.Agent平台信任机制研究[J].通信技术,2008,41(1):118-120. 被引量:4
  • 10孙昱,管海兵.P2P网络信任模型研究综述[J].信息安全与通信保密,2008,30(4):37-38. 被引量:5

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部