A Trust and Context Based Access Control Model for Distributed Systems

被引:34
作者
Feng, Fujun [1 ,2 ]
Lin, Chuang [1 ]
Peng, Dongsheng [1 ]
Li, Junshan [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Second Art Engn Coll, Dept Comp Sci & Technol, Xian, Peoples R China
来源
HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS | 2008年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/HPCC.2008.37
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to overcome the limitations in traditional access control models such as identity-based access control and meet the access requirements in distributed systems, we propose a Trust and Context based Access Control model called TCAC, it extends the traditional RBAC (Role based Access Control) model with the notion of trust and context. Role assignment in TCAC is based on the trustworthiness and context information of users. The TCAC model is flexible, scalable, and well suitable for the dynamic and distributed systems. Then we provide a trust evaluation mechanism based on the local and global reputation to compute the trust value of a user in distributed system, which can avoid malicious nodes behave correctly in order to get the highest possible trust value. Finally an implementation framework of the access control system based on TCAC is described.
引用
收藏
页码:629 / +
页数:2
相关论文
共 13 条
[1]  
[Anonymous], 2005, P 10 S ACCESS CONTRO
[2]  
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[3]   A context-aware security architecture for emerging applications [J].
Covington, MJ ;
Fogla, P ;
Zhan, ZY ;
Ahamad, M .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :249-258
[4]  
COVINGTON MJ, 2000, P 23 NAT INF SYST SE
[5]  
Covington MJ, 2001, P 6 ACM S ACC CONTR, P10
[6]  
Gambetta D., 1998, TRUST MAKING BREAKIN
[7]  
GROBA C, 2007, P 2 INT C AV REL SEC
[8]   Design of a role-based trust-management framework [J].
Li, NH ;
Mitchell, JC ;
Winsborough, WH .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :114-130
[9]  
LIAN Q, 2006, P 5 INT WORKSH PEER
[10]  
Sandhu R, 2005, P 10 ACM S ACC CONTR, P147