A Web Cross-Domain Access Control Model Based on Trust Degree

Article Preview

Abstract:

According to cross domain access control has model cannot solve the problem of record history operation; the application of trust evaluation theory reference XACML structure presents a new model. First of all, this paper introduces based on subjective logic trust evaluation theory and XACML standard decision framework. Secondly, combining trust management technology, puts forward the applied in Web cross domain access control T - WAC model, solved the cross domain access of trust computation and update. Finally, through the simulation experiments, using test data of the new model of the effect of the contrast analysis. The results show that T - WAC model can automatically adjust the authorization, achieves the anticipated effect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

397-400

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Garnbetta D. Can we trust trust MGambetta D, ed. Trust: Making and Breaking Cooperative Relations. Blackwell: Oxford Press, 1990: 213-237.

Google Scholar

[2] Grandison T, Sloman M. A survey of Trust in Internet ApplicationsMIEEE Communications Surveys and Tutorials, Fourth Quarter 2000. (2001).

Google Scholar

[3] Blaze M, Feigenbaum J, Lacy J. Decentralized Trust ManagementMIEEE Conference on Security and Privacy. Oakland, California, USA, (1996).

DOI: 10.1109/secpri.1996.502679

Google Scholar

[4] Chu Yang-hua, Feigenbaunn J, LaMaeehia B, et al. REFEREE: Trust management for Web applications . Computer Networks and ISDN systems, 1997, 29(8-13): 953-964.

DOI: 10.1016/s0169-7552(97)00009-3

Google Scholar

[5] TangWen, ChenWen, ChenZhong, Subjective trust management model based on fuzzy set theory . Journal of Software. 2003, 14(8): 1401-1408.

Google Scholar

[6] Jªsang A, Knapskog S J. A Metric for Trusted SystemsMProc of the 21th National Security Conf, 1998: 541-549.

Google Scholar

[7] David F, Richard K. Role-Based Access Control . Proceedings of 15th National Computer Security Conference. 1992: 1-11.

Google Scholar

[8] Sun. Sun's XACML Implementation [EB/OL]. [2006-05-12]. http: /sunxacml. sourceforge. net /(2006).

Google Scholar