Research of Access Authorization Model Based on Trust Negotiation in the P2P Network

被引:0
|
作者
Ye, Junyao [1 ]
Wang, Yanhong [1 ]
Wang, Yinglian
机构
[1] Jingdezhen Ceram Inst, Coll Informat Engn, Jingdezhen, Peoples R China
关键词
P2P; Access Authorization; Trust Negotiation; Security Function;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article constructs the access authorization model under the P2P network, which solves the resource access authorization problem under high security environment. Firstly, it designs the access control strategy of the model, then analyzes the four role logical operators and designs the grammar rules of the access control strategy. Lastly, construct a high security trust negotiation based on security function, which makes the security of the model has been greatly improved.
引用
收藏
页码:422 / 427
页数:6
相关论文
共 50 条
  • [31] A P2P global trust model based on recommendation
    Zhang, Z
    Wang, XM
    Wang, YX
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3975 - 3980
  • [32] Trust mechanism in distributed access control model of P2P networks
    Wang, Lei
    Zhu, Yanqin
    Jin, Lanfang
    Luo, Xizhao
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 19 - 24
  • [33] Research of P2P Offline Download based on Hybrid P2P Network
    Lin, Zhengzhong
    Yan, Jianfeng
    Urano, Yoshinori
    [J]. 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 89 - 92
  • [34] A secure model for controlling the hubs in P2P wireless network based on trust value
    Liu, Yuhua
    Xiong, Naixue
    Li, Yuling
    Xu, Kaihua
    Park, Jong Hyuk
    Lin, Chuan
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (08) : 997 - 1004
  • [35] An Improved Trust and Authorization Mechanism for P2P File Sharing System
    Chen Yang
    Hu Shuang
    Chen Gongliang
    Li Jianhua
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1080 - 1084
  • [36] GT-Bidding: Group Trust Model of P2P Network Based on Bidding
    Zhang, Lin
    Wei, Xinyan
    Huang, Yanwen
    Huang, Haiping
    Fu, Xiong
    Wang, Ruchuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] A Run-Length Coding Based Dynamic Trust Model in P2P Network
    Fang Qun
    Ji Yi
    Wu Guo-Xin
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 534 - 539
  • [38] A Global Trust Model of P2P Network Based on Distance-Weighted recommendation
    Li, Xueming
    Wang, Jianke
    [J]. NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 281 - 284
  • [39] Run length coding-based dynamic trust model for P2P network
    Fang, Qun
    Ji, Yi
    Wu, Guo-Xin
    Zhao, Sheng-Hui
    Wu, Peng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (06): : 1602 - 1616
  • [40] Study on Trust Model in P2P
    Gan Zhi-gang
    [J]. INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301