A Cross-Domain Access Control Model Based on Trust Measurement

被引:0
|
作者
YANG Xiaohui [1 ]
WANG Hong [1 ]
机构
[1] School of Computer Science and Technology, Hebei University
关键词
access control; cross-domain access; extensible access control markup language(XACML); trust degree;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement,defines several concepts(user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users’ uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language(XACML) model by adding inside trust manager point(ITMP) and outside trust manager point(OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [1] A cross-domain access control mechanism based on model migration and semantic reasoning
    Tan, Ming
    Liu, Aodi
    Wang, Xiaohan
    Shang, Siyuan
    Wang, Na
    Du, Xuehui
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (06): : 1599 - 1618
  • [2] Cross-Domain Access Control Model in Industrial IoT Environment
    Zhang, Zhen
    Wu, Xu
    Wei, Shuang
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [3] A cross-domain trust inferential transfer model for cross-domain Industrial Internet of Things
    Wu, Xu
    Liang, Junbin
    [J]. ICT EXPRESS, 2023, 9 (05): : 761 - 768
  • [4] Trust Management Model of Cross-Domain Authorization
    Guo, Xianchen
    Chen, Chen
    Zhang, Bei
    Li, Xinyou
    [J]. 9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 1138 - +
  • [5] The Research of Cross-Domain Access Control Based on Attribute Mapping
    Mu, Ling-ling
    Gao, Yan-yan
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 95 - 100
  • [6] Cross-Domain Attribute-Based Access Control Encryption
    Sedaghat, Mahdi
    Preneel, Bart
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 3 - 23
  • [7] A Multi-Level Cross-Domain Access Control Model Based On Role Mapping
    Lv, Bin
    Zhang, Di
    Mao, Rui
    Yang, Haitian
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MECHANICAL MATERIALS AND MANUFACTURING ENGINEERING (MMME 2016), 2016, 79 : 230 - 235
  • [8] Cross-Domain Access Control in a Military SOA
    Nordbotten, Nils Agne
    [J]. MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 448 - 455
  • [9] Cross-domain access control via PKI
    Denker, G
    Millen, J
    Miyake, Y
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 202 - 205
  • [10] Research on the Cross-domain Access Control Model in Wind Power Plant
    Zhang, Yan
    Duan, Bin
    Huang, Lingxiang
    Lin, Yuanyuan
    [J]. 2009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY, VOLS 1-4, 2009, : 1568 - +