A computational trust model for access control in P2P

被引:0
|
作者
Bo Lang
机构
[1] Beihang University,State Key Laboratory of Software Development Environment
来源
关键词
trust management; access control; trust degree based access control; computational trust model; trust graph expression;
D O I
暂无
中图分类号
学科分类号
摘要
Trust brings a new method for building scalable and fine-grained access control mechanism in P2P systems. The quantificational expression of trust and the calculation of trust in a trust network are the basis of trust degree based access control. In this paper, the properties of trust is analyzed by referring to the fruits from social science; the semantics of trust in the context of access control is described, and a trust degree based access control model named TDBAC is introduced. Basing on the properties and semantics of trust, a computational trust model which includes a multilevel comprehensive evaluation method for expressing direct trust and calculators for computing recommended trust is put forward. To compute trust in a trust network, an algorithm that transforms a trust network to a computable expression is given. The algorithm simplifies the computation process and is also flexible.
引用
收藏
页码:896 / 910
页数:14
相关论文
共 50 条
  • [1] A computational trust model for access control in P2P
    Lang Bo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (05) : 896 - 910
  • [2] A computational trust model for access control in P2P
    LANG Bo State Key Laboratory of Software Development Environment
    [J]. Science China(Information Sciences), 2010, 53 (05) : 896 - 910
  • [3] Trust mechanism in distributed access control model of P2P networks
    Wang, Lei
    Zhu, Yanqin
    Jin, Lanfang
    Luo, Xizhao
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 19 - 24
  • [4] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +
  • [5] Dynamic policy based model for trust based access control in P2P applications
    Chatterjee, Madhumita
    Sivakumar, G.
    Menezes, Bernard
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 861 - 865
  • [6] Analysis of a new P2P trust control model
    Tang, Jing
    Shen, Le-Ping
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2010, 42 (07): : 1172 - 1176
  • [7] P2P trust model in the trust value
    Jiang Haowei
    Tan Yubo
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 365 - 367
  • [8] A computational reputation model in P2P networks based on trust and distrust
    Lin, W
    Yang, YT
    Zhang, SQ
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 501 - 508
  • [9] The model for decentralized access control in P2P environmens
    Shishaev, M.
    Shemjakin, A.
    [J]. Annals of DAAAM for 2006 & Proceedings of the 17th International DAAAM Symposium: INTELLIGENT MANUFACTURING & AUTOMATION: FOCUS ON MECHATRONICS AND ROBOTICS, 2006, : 377 - 378
  • [10] Study on Trust Model in P2P
    Gan Zhi-gang
    [J]. INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301