Trust-Based Fuzzy Access Control Model Research

被引:0
|
作者
Su, Rina [1 ]
Zhang, Yongping [1 ]
He, Zhongkun [1 ]
Fan, Shaojing [1 ]
机构
[1] Ningbo Univ Technol, Sch Elect & Informat Engn, Ningbo 315016, Zhejiang, Peoples R China
关键词
Trust-based access control; fuzzy inference; dynamic access; context information;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust-based access control model uses the value of users' static trust corresponding to the static attributes to get security of access control. However, facing the large number of users in the open system, the calculation of trust not only includes the static properties but also the context information with the ever-changing environment in the system. Using the fixed value to express the trust of the user to grant permissions without considering the dynamic context information may reduce the effectively of access control. Therefore, this paper proposes to use the fuzzy theory into the trust-based access control to solve the problem of dynamic access control by constructing reasonable structure with the fuzzy membership interval of the context information, along with establishing fuzzy rules for fuzzy inference.
引用
收藏
页码:393 / 399
页数:7
相关论文
共 50 条
  • [1] Application of Fuzzy Neural Network in the Trust-Based Access Control Model
    Su, Rina
    Zhang, Yongping
    Fan, Jianbo
    Wang, Yu
    [J]. 2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
  • [2] A trust-based dynamic access control model
    Ma, Shunan
    He, Jingsha
    Gao, Feng
    Sun, Xuguang
    [J]. Journal of Information and Computational Science, 2010, 7 (10): : 2165 - 2173
  • [3] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [4] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [5] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    [J]. DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [6] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [7] Research on trust-based access control in medical cloud environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 14 - 14
  • [8] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [9] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [10] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257