A trust-based dynamic access control model

被引:0
|
作者
Ma, Shunan [1 ]
He, Jingsha [2 ]
Gao, Feng [1 ]
Sun, Xuguang [3 ]
机构
[1] College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China
[2] School of Software Engineering, Beijing University of Technology, Beijing 100124, China
[3] Institute of Disaster Prevention, Sanhe 065201, China
来源
关键词
Binary trees - Access control models;
D O I
暂无
中图分类号
学科分类号
摘要
Traditional access control models are suitable for centralized and static environments, but can hardly meet the requirements of open and dynamic environments because subjects and objects are not always known in advance. As an important consideration for security, trust can be applied to security management, especially in access control. In trust-based access control, mapping between trust values and access permissions is an important issue. In this paper, we present a trust quantification algorithm based on grey fuzzy theory and propose a new trust-based dynamic access control model. In the model, we use the arcsine function to construct an algorithm to perform mapping between trust values and access permissions for effective access control. Simulation results show that our model is suitable for access control in open and dynamic environments with a high degree of scalability. © 2010 Binary Information Press.
引用
收藏
页码:2165 / 2173
相关论文
共 50 条
  • [1] Actor and Trust-based dynamic access control model in universal Computing Environment
    Hu, Hua
    Luo, Ande
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 683 - 687
  • [2] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [3] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    [J]. DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [4] Trust-Based Fuzzy Access Control Model Research
    Su, Rina
    Zhang, Yongping
    He, Zhongkun
    Fan, Shaojing
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 393 - 399
  • [5] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [6] Formal Modeling of Trust-Based Access Control in Dynamic Coalitions
    Sarrouh, Nadim
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 224 - 229
  • [7] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +
  • [8] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [9] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257
  • [10] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314