Trust-Based Fuzzy Access Control Model Research

被引:0
|
作者
Su, Rina [1 ]
Zhang, Yongping [1 ]
He, Zhongkun [1 ]
Fan, Shaojing [1 ]
机构
[1] Ningbo Univ Technol, Sch Elect & Informat Engn, Ningbo 315016, Zhejiang, Peoples R China
关键词
Trust-based access control; fuzzy inference; dynamic access; context information;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust-based access control model uses the value of users' static trust corresponding to the static attributes to get security of access control. However, facing the large number of users in the open system, the calculation of trust not only includes the static properties but also the context information with the ever-changing environment in the system. Using the fixed value to express the trust of the user to grant permissions without considering the dynamic context information may reduce the effectively of access control. Therefore, this paper proposes to use the fuzzy theory into the trust-based access control to solve the problem of dynamic access control by constructing reasonable structure with the fuzzy membership interval of the context information, along with establishing fuzzy rules for fuzzy inference.
引用
收藏
页码:393 / 399
页数:7
相关论文
共 50 条
  • [21] Risk models for trust-based access control (TBAC)
    Dimmock, N
    Bacon, J
    Ingram, D
    Moody, K
    TRUST MANAGEMENT, PROCEEDINGS, 2005, 3477 : 364 - 371
  • [22] Trust-based access control in virtual learning community
    Wang, Shujuan
    Liu, Qingtang
    INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 514 - +
  • [23] TAPS: Trust-based Access Control and Protect System
    Yoo, Yoon-Sik
    Lee, Hyungkyu
    Jung, Boo-Geum
    Park, HeaSook
    Kim, Kiwon
    Park, Cheong Hee
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 71 - 75
  • [24] Actor and Trust-based dynamic access control model in universal Computing Environment
    Hu, Hua
    Luo, Ande
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 683 - 687
  • [25] The Trust-Based Access Control Model in the Wireless Sensor Network<bold> </bold>
    Luo Jing-tang
    Yao Shi-ying
    Gou Ji-jun
    Xu Qi-yang
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 112 - 116
  • [26] TrustAC:: Trust-based access control for pervasive devices
    Almenárez, F
    Marín, A
    Campo, C
    García, RC
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 225 - 238
  • [27] Trust-based Access Control Model with Quantification Method for Protecting Sensitive Attributes
    Salji, Mohd Rafiz
    Udzir, Nur Izura
    Ninggal, Mohd Izuan Hafez
    Sani, Nor Fazlida Mohd
    Ibrahim, Hamidah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 695 - 707
  • [28] A trust-based context-aware access control model for Web-services
    Bhatti, R
    Bertino, E
    Ghafoor, A
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 184 - 191
  • [29] Analysis of trust-based access control using game theory
    He, J. (jhe@bjut.edu.cn), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (08):
  • [30] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +