A Cross-Domain Access Control Model Based on Trust Measurement

被引:0
|
作者
YANG Xiaohui [1 ]
WANG Hong [1 ]
机构
[1] School of Computer Science and Technology, Hebei University
关键词
access control; cross-domain access; extensible access control markup language(XACML); trust degree;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement,defines several concepts(user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users’ uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language(XACML) model by adding inside trust manager point(ITMP) and outside trust manager point(OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [41] Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
    Park, Youngho
    Shin, Su Jin
    Shin, Sang Uk
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 671 - 688
  • [42] Double-Tier Role and Organization-based Cross-Domain Access Control Mechanism
    Xiong, Houren
    Chen, Xingyuan
    Du, Xuehui
    Yang, Yan
    [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,
  • [43] Trust-based Access Control Model in Multi-domain Environment
    Zhang Qikun
    Wang Ruifang
    Qu Jiaqing
    Gan Yong
    Zheng Jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 149 - 160
  • [44] Cross-Domain Text Classification Based on BERT Model
    Zhang, Kuan
    Hei, Xinhong
    Fei, Rong
    Guo, Yufan
    Jiao, Rui
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 197 - 208
  • [45] Exploiting Trust and Usage Context for Cross-Domain Recommendation
    Xu, Zhenzhen
    Zhang, Fuli
    Wang, Wei
    Liu, Haifeng
    Kong, Xiangjie
    [J]. IEEE ACCESS, 2016, 4 : 2398 - 2407
  • [46] The Research of Cross-domain Usage Control Model in Web Services
    Zhang, Guoping
    Gong, Wentao
    Tian, Jiazheng
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 93 - 97
  • [47] Quantifying Inhibitory Control as Externalizing Proneness: A Cross-Domain Model
    Venables, Noah C.
    Foell, Jens
    Yancey, James R.
    Kane, Michael J.
    Engle, Randall W.
    Patrick, Christopher J.
    [J]. CLINICAL PSYCHOLOGICAL SCIENCE, 2018, 6 (04) : 561 - 580
  • [48] Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation
    Shen, Sunan
    Tang, Shaohua
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 399 - 404
  • [49] Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy
    Zhu, Tianyi
    Li, Fenghua
    Jin, Wei
    Guo, Yunchuan
    Fang, Liang
    Cheng, Lin
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 29 - 48
  • [50] A Multi-level Security Access Control Framework for Cross-Domain Networks
    Zhang, Hongbin
    Chang, Jiang
    Wang, Junshe
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 316 - 319