期刊文献+

移动互联网环境下基于动态信任值的访问控制方法研究 被引量:6

Research on Access Control Method Based on Dynamic Trust Degree in Mobile Internet Environment
下载PDF
导出
摘要 现有的基于角色的访问控制(RBAC)是一种静态的访问控制方法,特定的用户只能映射到固定的角色中,无法满足身份与角色之间的动态关系。文章结合移动互联网位置性和实时性的特点,引入位置态和时间态,给出移动互联网环境下基于动态信任值的访问控制方法。同一用户在不同的位置态和时间态下对应着不同的角色,拥有不同的访问权限。同时,用户的信任值不再是一成不变的,一方面,随着用户对不同资源的访问,用户的信任值会增加或者减少;另一方面,用户的信任值会类似于遗忘曲线一样随着时间的流逝而递减。文中方法通过动态调整用户的信任值,克服了当前访问控制在移动互联网环境下安全性不足的缺点,能够有效控制用户在不同状态下对不同资源的访问权限。实验证明,该方法正确、有效。 The existing role based access control (RBAC) is a kind o f static access control method.A user can only be mapped to a fixed role, and can5t meet the dynamic relationship between user and rolein this method. This paper, according to the characteristics o f mobile Internet, introduces the location stateand time state, gives the access control method based on dynamic trust in mobile Internet environment.The same user has different roles in different location states and time states, and has different accesspermissions. A t the same time, user trust degree is no longer immutable, userJs trust w ill increase ordecrease w ith access to different resources, and userJs trust degree w ill decreasing w ith the passage o ftime. B y dynamically adjusting the userJs trust degree, it overcomes the shortcomings o f the currentaccess control in the mobile Internet environment, and effectively controls the user5s access permission indifferent conditions. Experiments show that the method is correct and effective.
出处 《信息网络安全》 2016年第8期46-53,共8页 Netinfo Security
基金 国家国际科技合作专项[2013DFM10100]
关键词 移动互联网 动态信任值 访问控制 mobile Internet dynamic trust degree access control
  • 相关文献

参考文献8

二级参考文献54

  • 1龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3刘劲松,胡轶,王东方.浅谈网站安全技术[J].网络安全技术与应用,2006(7):29-31. 被引量:9
  • 4张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 5R Sandhu,E Coyne, H Feinstein, et al. Role-based access control models[ J]. IEEE Computer, 1996,29(2 ) :38 - 47. 被引量:1
  • 6R Sandhu, V Bhamidipati, Q Munawer. The ARBAC97 model for role-based administration of mles[J]. ACM Transactions on Information and System Security, 1997,2( 1 ) : 105 - 135. 被引量:1
  • 7D F Ferraiolo,R Sandhu,S Gavrila,et al.Proposed NIST standard for role-based access control[J]. ACM Transactions on In- formation and System Security, 2001,4(3) : 224 - 274. 被引量:1
  • 8P H Bammigatti. GenericWA-RBAC: role based access control model for web applications[ A]. Proceedings of the 9th International Conference on Information Technology ( ICIT' 06) [ C ]. Bhubaneswar, India:IEEE Computer Society, 2006.237 - 240. 被引量:1
  • 9L Dong, S Yu, K Ouyang, The dynamic endpoint-based access control model on VPN [ A ]. Proceedings of the International Conference on Networking, Architecture, and Storage ( NAS 2007)[ C]. Guilin, China: IEEE Computer Society, 2007.44 - 54. 被引量:1
  • 10H Takabi,M Amini,R Jalili. Enhancing role-based access control model through fuzzy relations[ A] .Proceedings of the Third International Symposium on Information Assurance and Security [ C]. Manchester, UK: IEEE Computer Society, 2007. 131 - 136. 被引量:1

共引文献328

同被引文献43

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部