Trust-based Access Control Model in Multi-domain Environment

被引:0
|
作者
Zhang Qikun [1 ]
Wang Ruifang [1 ]
Qu Jiaqing [2 ]
Gan Yong [1 ]
Zheng Jun [3 ]
机构
[1] Zhengzhou Univ Light Ind, Inst Comp & Commun Engn, Zhengzhou 450002, Henan, Peoples R China
[2] Shanghai Radio Equipment Res Inst, Shanghai 200090, Peoples R China
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
Trust; access control; multi-domain; heap;
D O I
10.14257/ijsia.2014.8.5.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is a process which control users to execute some operations of access some network resource according to the users identify of attribution. This paper analyzes current access control model, and extends the RBAC (role based access control) model, and based on which we propose a trust based access control model in Multi-domain environment (MDTRBAC). Design a heap-based trust management mechanism for MD-TRBAC Model, which is used to control the cross-domain access resource among different domains. The MDTRBAC model can provide more security, flexible and dynamic access control mechanism, and therefore improve both the security and the reliable of authorization mechanism.
引用
收藏
页码:149 / 160
页数:12
相关论文
共 50 条
  • [41] TAPS: Trust-based Access Control and Protect System
    Yoo, Yoon-Sik
    Lee, Hyungkyu
    Jung, Boo-Geum
    Park, HeaSook
    Kim, Kiwon
    Park, Cheong Hee
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 71 - 75
  • [42] The Trust-Based Access Control Model in the Wireless Sensor Network<bold> </bold>
    Luo Jing-tang
    Yao Shi-ying
    Gou Ji-jun
    Xu Qi-yang
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 112 - 116
  • [43] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [44] TrustAC:: Trust-based access control for pervasive devices
    Almenárez, F
    Marín, A
    Campo, C
    García, RC
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 225 - 238
  • [45] Trust-based Access Control Model with Quantification Method for Protecting Sensitive Attributes
    Salji, Mohd Rafiz
    Udzir, Nur Izura
    Ninggal, Mohd Izuan Hafez
    Sani, Nor Fazlida Mohd
    Ibrahim, Hamidah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 695 - 707
  • [46] Blockchain-based access control architecture for multi-domain environments
    Du, Zhiqiang
    Li, Yunliang
    Fu, Yanfang
    Zheng, Xianghan
    PERVASIVE AND MOBILE COMPUTING, 2024, 98
  • [47] An Access Control Model for Multi-level Security in Multi-domain Networking Environments
    Zhang, Hongbin
    Wang, Junshe
    Chang, Jiang
    2017 9TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC 2017), 2017, : 809 - 814
  • [48] An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    Liu, Qiang
    Zhang, Hao
    Wan, Jiafu
    Chen, Xin
    IEEE ACCESS, 2017, 5 : 7001 - 7011
  • [49] Multi-domain authorization and decision-making method of access control in the edge environment
    Sun, Yongxia
    Jiang, Weijin
    Yang, Ying
    Zhu, Haoran
    Jiang, Yirong
    COMPUTER NETWORKS, 2023, 228
  • [50] Collaborative Access Control for Multi-Domain Cloud Computing
    Ben Ayed, Souheil
    Teraoka, Fumio
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (10) : 2401 - 2414