A Flexible RBAC Model Based on Trust in Open System

被引:6
作者
Deng, Wenyang [1 ]
Zhou, Zhouyi [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
来源
2012 THIRD GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS 2012) | 2012年
关键词
Open system; Access Control; Trust; Role-based Access Control; ACCESS-CONTROL;
D O I
10.1109/GCIS.2012.79
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In open system, the user nodes and resource nodes are variable, it is tiresome for the system administrator to assign roles for the users, and it is almost impossible to check their priorities to access different kind of resources in the system in which the traditional Role Based Access Control (RBAC) model is adapted. To simplify the access control and standardize security strategy in open system, a flexible RBAC model based on trust is proposed. Use the evaluation between the user node and resource node to calculate the direct trust of them, and employ the evaluation among the resource nodes to get the recommended trust of the resource nodes. Using two trust values, together with the session history of user nodes and resource nodes, the system assigns the roles as well as its corresponding priorities for the user node flexibly, and recommends proper resource nodes to process their assignments. AIMD (Additive-increase, multiplicative-decrease) algorithm is adopted in the trust evaluation of the system to punish the node with malicious behaviors. Also, the notion of accuracy is introduced into the system to make the evaluation between the user and resource reasonable and objective.
引用
收藏
页码:400 / 404
页数:5
相关论文
共 16 条
[1]   A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment [J].
Abu Bakar, Asmidar ;
Ismail, Roslan ;
Jais, Jamilin .
NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, :533-+
[2]   Role-based access control with X.509 attribute certificates [J].
Chadwick, DW ;
Otenko, A ;
Ball, E .
IEEE INTERNET COMPUTING, 2003, 7 (02) :62-69
[3]  
Chakraborty Sudip, SACMAT, P49
[4]  
Frank Mario, P 15 ACM C COMP COMM, P25
[5]  
Frank Mario, P 15 ACM C COMP COMM, P302
[6]  
Frank Mario, P 15 ACM C COMP COMM, P299
[7]  
Jin Taige, 2009, INT C COMP INT SOFTW, P1
[8]  
Kurose James F., 2005, COMPUTER NETWORKING, P266
[9]   Design of a role-based trust-management framework [J].
Li, NH ;
Mitchell, JC ;
Winsborough, WH .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :114-130
[10]  
Luo Junzhou, 2008, CHIN GRID ANN C CHIN, V8, P23