A computational trust model for access control in P2P

被引:0
|
作者
Bo Lang
机构
[1] Beihang University,State Key Laboratory of Software Development Environment
来源
关键词
trust management; access control; trust degree based access control; computational trust model; trust graph expression;
D O I
暂无
中图分类号
学科分类号
摘要
Trust brings a new method for building scalable and fine-grained access control mechanism in P2P systems. The quantificational expression of trust and the calculation of trust in a trust network are the basis of trust degree based access control. In this paper, the properties of trust is analyzed by referring to the fruits from social science; the semantics of trust in the context of access control is described, and a trust degree based access control model named TDBAC is introduced. Basing on the properties and semantics of trust, a computational trust model which includes a multilevel comprehensive evaluation method for expressing direct trust and calculators for computing recommended trust is put forward. To compute trust in a trust network, an algorithm that transforms a trust network to a computable expression is given. The algorithm simplifies the computation process and is also flexible.
引用
收藏
页码:896 / 910
页数:14
相关论文
共 50 条
  • [41] Research of a new Distributed Trust Model in P2P
    Hao, Yan
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1085 - 1090
  • [42] A P2P global trust model based on recommendation
    Zhang, Z
    Wang, XM
    Wang, YX
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3975 - 3980
  • [43] \ Distributed and Secure Access Control in P2P Databases
    Bonifati, Angela
    Liu, Ruilin
    Wang, Hui
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 113 - +
  • [44] TD-Trust: A Time Domain Based P2P Trust Model
    Li, Dong
    Zhu, Zhengtao
    Cheng, Chunling
    Du, Fei
    [J]. ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, PT I, 2011, 7002 : 467 - 474
  • [45] A P2P trust model based on multi-dimensional trust evaluation
    Wang, Xinsheng
    Liang, Peng
    Ma, Huidong
    Xing, Dan
    Wang, Baozong
    [J]. BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 347 - 356
  • [46] Related cluster based trust model for P2P networks
    [J]. Ma, Y. (myron_my@163.com), 1600, Northeast University (34):
  • [47] Hybrid Trust Model for Worm Mitigation in P2P Networks
    Amine Rguibi, Mohamed
    Moussa, Najem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 21 - 36
  • [48] Incentive Strategy Based on Trust Model in P2P Network
    Lu, Yang
    Wang, Xue
    [J]. 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 192 - 195
  • [49] A Time-decay based P2P Trust Model
    Zhang, Yong
    Wang, Kewen
    Li, Keqiu
    Qu, Wenyu
    Xiang, Yang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 235 - +
  • [50] A Novel Trust Evaluation Model for Mobile P2P Networks
    Wu, Xu
    [J]. NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 210 - 219