A Trust-Based Access Control Model in P2P Networks Using Ant Colony Optimization

被引:0
|
作者
Li, Junqing
Li, Xinyou
Xie, Shengxian
Chen, Chen
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents a novel access control model based on the basic Role-based access control. In our access control model, a trust-based user-to-role mapping process was introduced. The trust aggregation process is based on ant colony optimization (ACO), which was used widely in present combinational optimization problem. With ACO, the trust aggregation process will be a dynamic and automatic process without a central server. We also add fine-grained trust attributes into our access control model, which can improve our trust aggregation process deeply. Through this dynamic and automatic trust aggregation process, our access control can adapt to distributed and collaborative environment such as P2P networks easily and conveniently.
引用
收藏
页码:180 / 183
页数:4
相关论文
共 50 条
  • [1] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +
  • [2] A P2P Resource Search Model Based on Ant Colony Optimization
    Zhou, Lian-ying
    Sun, Long-ji
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 433 - 436
  • [3] Trust mechanism in distributed access control model of P2P networks
    Wang, Lei
    Zhu, Yanqin
    Jin, Lanfang
    Luo, Xizhao
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 19 - 24
  • [4] A distributed trust-based refutation model in P2P system
    Liu, Yu-Mei
    Yang, Shou-Bao
    Guo, Lei-Tao
    Chen, Wan-Ming
    Guo, Liang-Nun
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 294 - +
  • [5] A computational trust model for access control in P2P
    Lang Bo
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (05) : 896 - 910
  • [6] A computational trust model for access control in P2P
    LANG Bo State Key Laboratory of Software Development Environment
    ScienceChina(InformationSciences), 2010, 53 (05) : 896 - 910
  • [7] A computational trust model for access control in P2P
    Bo Lang
    Science China Information Sciences, 2010, 53 : 896 - 910
  • [8] Trust-based exchange of services to motivate cooperation in P2P networks
    Anna Satsiou
    Leandros Tassiulas
    Peer-to-Peer Networking and Applications, 2011, 4 : 122 - 145
  • [9] A Trust-based Immune Strategy for File Pollution in P2P Networks
    Xu, Xianwei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 271 - 280
  • [10] Trust-based exchange of services to motivate cooperation in P2P networks
    Satsiou, Anna
    Tassiulas, Leandros
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) : 122 - 145