Access Control Based on Trust Policy in Open Grid Environment

Article Preview

Abstract:

This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level. It also can establish trust policy based on assets importance and user trust level, specify the relationship between user trust and assets value and take it as a dynamic trust constraint for access control. The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

390-394

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Liming. Study on the Key Issue of Grid User Management: [dissertation]. Beijing. Graduated University of Chinese Academy of Sciences, (2005).

Google Scholar

[2] Xu Yujie. The Research of a Trust Model-Based Task Scheduling Algorithm for Data Grid: [dissertation]. Dalian. Dalian Maritime University, (2010).

Google Scholar

[3] Tu Jinde, Qin Xiaolin, Dai Hua. Double-authorization Chain Sets Based Access Control Model [J]. Computer Science, 2010, 7: 160-164.

Google Scholar

[4] Li HaiHua, Du Xiaoyong, Tian Xuan. A Capability Enhanced Trust Evaluation Model for Web Services [J]. Chinese Journal of Computers, 2008, 31(8): 1471-1477.

DOI: 10.3724/sp.j.1016.2008.01471

Google Scholar

[5] Li Xiaoyong, Gui XiaoLin. Research on Dynamic Trust Model for Large Scale Distributed Environment [J]. Journal of Software, 2007, 18(6): 1510-1521.

Google Scholar

[6] Wu Zhijun, Yang Yixian. Research of Indicator for Information Assurance Evaluation. [J]. Computer Engineering, 2010, 7: 7-10.

Google Scholar

[7] Yang Xiaoming, Luo Hengfeng, Fan Chengyu. Analysis of risk evaluation techniques on information system security [J]. Journal of Computer Applications, 2008, 8: 1920-(1923).

Google Scholar

[8] Wei Yong, Lian Yifeng. A Network Security Situational Awareness Model Based on Log Audit and Performance Correction [J]. Chinese Journal of Computers, 2009, 4: 763-772.

DOI: 10.3724/sp.j.1016.2009.00763

Google Scholar