Research of Access Authorization Model Based on Trust Negotiation in the P2P Network

被引:0
|
作者
Ye, Junyao [1 ]
Wang, Yanhong [1 ]
Wang, Yinglian
机构
[1] Jingdezhen Ceram Inst, Coll Informat Engn, Jingdezhen, Peoples R China
关键词
P2P; Access Authorization; Trust Negotiation; Security Function;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article constructs the access authorization model under the P2P network, which solves the resource access authorization problem under high security environment. Firstly, it designs the access control strategy of the model, then analyzes the four role logical operators and designs the grammar rules of the access control strategy. Lastly, construct a high security trust negotiation based on security function, which makes the security of the model has been greatly improved.
引用
收藏
页码:422 / 427
页数:6
相关论文
共 50 条
  • [1] Trust model based on P2P network
    Ouyang, Guang
    Chen, Xiang
    [J]. Journal of Networks, 2013, 8 (09) : 2013 - 2020
  • [2] Research on trust model in the mobile P2P network
    Chen, Jiahua
    Guo, Xiaobin
    Li, Zhihuai
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION, CYBERNETICS AND COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2017, : 528 - 532
  • [3] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +
  • [4] P2P trust model based on Bayesian network
    Ji Chang-peng
    Gao Zhao-zhou
    [J]. 2010 INTERNATIONAL CONFERENCE ON FUTURE CONTROL AND AUTOMATION (ICFCA 2010), 2010, : 126 - 128
  • [5] A trust model of P2P network based on domain
    Xu, Fen
    Guo, Yajun
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 449 - 452
  • [6] Research of Trust Model in P2P Network Based on Trusted Computing0
    Rong, Li
    Lei, Li
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [7] Incentive Strategy Based on Trust Model in P2P Network
    Lu, Yang
    Wang, Xue
    [J]. 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 192 - 195
  • [8] A Trust Model of P2P Network Based on Reputation and Risk
    Du Ruizhong
    Tian Junfeng
    Wang Zixian
    Ma Xiaoxue
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 382 - +
  • [9] An optimized and improved network trust model based on P2P
    Wei, Li
    Zhao, Chunjian
    [J]. Journal of Networks, 2013, 8 (10) : 2293 - 2301
  • [10] TRUST MODEL BASED ON PERSONAL PREFERENCE IN P2P NETWORK
    Ma Shuqin
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 163 - 166