A Trust-Based Access Control Model in P2P Networks Using Ant Colony Optimization

被引:0
|
作者
Li, Junqing
Li, Xinyou
Xie, Shengxian
Chen, Chen
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents a novel access control model based on the basic Role-based access control. In our access control model, a trust-based user-to-role mapping process was introduced. The trust aggregation process is based on ant colony optimization (ACO), which was used widely in present combinational optimization problem. With ACO, the trust aggregation process will be a dynamic and automatic process without a central server. We also add fine-grained trust attributes into our access control model, which can improve our trust aggregation process deeply. Through this dynamic and automatic trust aggregation process, our access control can adapt to distributed and collaborative environment such as P2P networks easily and conveniently.
引用
收藏
页码:180 / 183
页数:4
相关论文
共 50 条
  • [31] A Trust Model Based on the Extended Subjective Logic for P2P Networks
    Ma Xiaoxue
    Wang Zixian
    Liu Fei
    Bian Jing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 210 - 213
  • [32] A fuzzy set based trust and reputation model in P2P networks
    Zhang, SQ
    Lu, DX
    Yang, YT
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 211 - 217
  • [33] Adaptive Cluster-based Trust Model for P2P Networks
    Wang Ke
    Cai Shi-yu
    Guo Shu
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 529 - 533
  • [34] A distributed trust model based on vector space in P2P networks
    Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, China
    Jisuanji Yanjiu yu Fazhan, 2006, 9 (1564-1570):
  • [35] A computational reputation model in P2P networks based on trust and distrust
    Lin, W
    Yang, YT
    Zhang, SQ
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 501 - 508
  • [36] Trust Evaluation Model for P2P Networks based on Time and Interaction
    Ke Xuemeng
    Zhou Guofu
    Du Zhoumin
    2018 3RD INTERNATIONAL CONFERENCE ON MEASUREMENT INSTRUMENTATION AND ELECTRONICS (ICMIE 2018), 2018, 208
  • [37] A Novel Community-Based Trust Model for P2P Networks
    Wang, Songxin
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 521 - 528
  • [38] Trust model based on similarity measure of vectors in P2P networks
    Guo, LT
    Yang, SB
    Wang, J
    Zhou, JY
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 836 - 847
  • [39] Research of Access Authorization Model Based on Trust Negotiation in the P2P Network
    Ye, Junyao
    Wang, Yanhong
    Wang, Yinglian
    ADVANCES IN INFORMATION TECHNOLOGY AND EDUCATION, PT I, 2011, 201 : 422 - 427
  • [40] A Preventing Fraud Trust Model in P2P Networks
    Liu, Siming
    Yu, Yang
    Xu, Jiaxing
    Huang, Zhenguang
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2305 - 2311