Paper Title:
An Access Control Schema Using Fuzzy Algorithm
  Abstract

A multi-policy access control model is proposed, with the model, access control based on policy regulation and XML based policy description is given. In order to describe the algorithm, we discussed the categorizing, adding, editing and canceling policy. For policy selection and decision, through fossilization and analysis of role, popedom and security policy, fuzzy algorithm is introduced for judging of user popedom. As the analysis reveals, this model can support multiple policy coordination of current models.

  Info
Periodical
Advanced Materials Research (Volumes 121-122)
Edited by
Donald C. Wunsch II, Honghua Tan, Dehuai Zeng, Qi Luo
Pages
970-974
DOI
10.4028/www.scientific.net/AMR.121-122.970
Citation
T. Peng, M. H. Jiang, M. Hu, "An Access Control Schema Using Fuzzy Algorithm", Advanced Materials Research, Vols. 121-122, pp. 970-974, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Tao Peng, Ming Hua Jiang, Ming Hu
Abstract:A multi-polices access control model is proposed, with the model, access control based on policy regulation and XML based policy description...
558
Authors: Chang Ying Dai, Wen Tao Gong, Jing Liu
Abstract:With the rapid development of information technology, more and more requesters need accessing the services in different access domains, which...
1275
Authors: Ai Juan Zhang, Jing Xiang Gao, Cheng Ji
Abstract:Distributed applications often require integrating security policies of collaborating parties. The integration must be able to support...
848
Authors: Long Jun Huang, Cai Ying Zhou, Yuan Wang Wei, Li Ping Dai
Abstract:The scale of modern systems is increasingly large, the system safety requirements have become more sophisticated, a single access control...
1081
Authors: Kun Huang, Yun Song Jian
Chapter 4: Mechatronics, Automation and Control
Abstract:The term usage control (UCON)[1] is a generalization of access control to cover obligations, conditions, continuity (ongoing...
1858