Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.
引用
收藏
页码:383 / 385
页数:3
相关论文
共 3 条
[1]
McCollum C. J., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P190, DOI 10.1109/RISP.1990.63850
[1]
McCollum C. J., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P190, DOI 10.1109/RISP.1990.63850