The Study of the Trust-Role Based Access Control

Article Preview

Abstract:

In light of the problem of the security of Peer-to-Peer networks, an access control method is proposed which is based on the trust relationship between the peers in this paper. Thus the peers of different trust values can get different access authorities.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

7042-7045

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Schäfer, K. Malinka and P. Hanáček, Peer-to-Peer Networks Security, The Third International Conference on Internet Monitoring and Protection(ICIMP 08), 2008, pp.74-79, doi: 10. 1109/ICIMP. 2008. 26.

DOI: 10.1109/icimp.2008.26

Google Scholar

[2] YU Guang-can, LU Zheng-ding, Li Rui-xuan, TANG Zhuo and SONG Wei, P2P-Based Collaborative Design System Access Control, Computer Engineering & Science, Vol. 29, No. 7, 2007, pp.34-36, 61.

Google Scholar

[3] LI Jun-qing, LI Xin-you, XIE Sheng-xian, LUO Hong-bin and LIU Guang-liang, Research on dynamic fine grained access control in P2P networks, Application Reseach of Computers, Vol. 26, No. 4, Apr. 2009, pp.1467-1470.

DOI: 10.1109/icdim.2008.4746703

Google Scholar

[4] DOU Wen, WANG Huai-Min, JIA Yan and ZOU Peng, A Recommendation-Based Peer-to-Peer Trust Model, Journal of Software, Vol. 15, No. 4, pp.571-583.

Google Scholar

[5] GE Jing-jun, HUANG Hua and HU Jian-ming, Backward Reasoning Algorithm of Fuzzy Petri Nets for Semantic Web Services Composition, Computer Science, Vol. 36, No. 9, Sep 2009, pp.205-207.

Google Scholar