计算机科学 ›› 2015, Vol. 42 ›› Issue (9): 94-96.doi: 10.11896/j.issn.1002-137X.2015.09.019

• 网络与通信 • 上一篇    下一篇

基于动态线性相关的访问控制模型研究

吴春琼,黄榕宁   

  1. 福州大学阳光学院 福州350015,福建师范大学数学与计算机科学学院 福州350117
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受福建省省教育厅资助

Dynamic Linear Relevance Based Access Control Model

WU Chun-qiong and HUANG Rong-ning   

  • Online:2018-11-14 Published:2018-11-14

摘要: 访问控制是网络资源共享领域的重要研究内容。为了提高访问控制中对未知节点的预测能力,提出了一种基于动态线性相关的访问控制模型。首先,提出了一种包含服务请求者、服务推荐节点和服务提供者的访问控制结构。其次,提出了一种动态的信任值线性计算方法,该方法将节点的全局信任值表示为直接信任值和推荐信任值的线性组合,并根据节点间的历史记录动态地调整直接信任值和推荐信任值的权重。最后通过仿真实验表明, 提出的访问控制模型与其他相关的访问控制模型相比,不仅具有更高的预测成功率,而且能更好地抵御节点的恶意攻击。

关键词: 访问控制,信任推荐,信任模型,线性组合

Abstract: The research of access control is an important issue in resource sharing based on networks.In order to improve the prediction ability of access control for unknown nodes,this paper proposed a dynamic linear relevance based access control model.Firstly,we proposed an architecture of access control containing service requestor,service recommendation node and service provider.Then,we proposed a dynamic trust score linear computing approach.The proposed approach represents the global trust score of node with the linear combination of direct trust score and recommendation trust score,and adjusts the weights of direct trust score and recommendation trust score with history records between nodes.Finally,the simulation experiments show that,compared with related access control models,the proposed model has higher prediction success rate,and can resist malicious attacks more efficiently.

Key words: Access control,Trust recommendation,Trust model,Linear combination

[1] Al-Slamy D N M A.E-Commerce security[J].IJCSNS International Journal of Computer Science and Network Security,2008,8(5):340-344
[2] 李凤华,苏铓,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813 Li Feng-hua,Su Mang,Shi Guo-zhen,et al.Reasearch Status and Development Trend of Access Control Model[J].Acta Electronica Sinica,2012,0(4):805-813
[3] Xiang Y,Ling Y.The Research on Chinese Taxation Policies Based on E-commerce Model Classification [C]∥ISECS’09.Washington DC,USA,2009:431-434
[4] Li Q.Analysis on Channel Information and Control Structure Performance in Food Supply Chain Under E-commerce Environment [C]∥ISISE’09.Washington DC,USA,2009:119-121
[5] Xia Y,Li Q,Wang L.Research on Decentralized E-commerceArchitecture in P2P Environment [C]∥ICECE’10.Washington DC,USA,2010:2929-2932
[6] Fan X,Li M,Ren Y.Dual-EigenRep:A Reputation-Based Trust Model for P2P File-Sharing Networks [C]∥UIC-ATC’10.Washington DC,USA,2010:358-363
[7] Li J,Wang X,Chen Y,et al.A Reputation Management Framework Based on Global Trust Model for P2P Systems [C]∥ICCS’06.Berlin,Heidelberg,2006:896-899
[8] 刘武,段海新,张洪,等.TRBAC:基于信任的访问控制模型[J].计算机研究与发展,2011,48(8):1414-1420 Liu Wu,Duan Hai-xin,Zhang hong,et al.TRBAC:Trust Based Access Control Model[J].Journal of Computer Research and Development,2011,48(8):1414-1420
[9] Mehdi M,Bouguila N,Bentahar J.A QoS-Based Trust Approach for Service Selection and Composition via Bayesian Networks [C]∥ICWS’13.Washington DC,USA,2013:211-218
[10] 李唯冠,赵逢禹.带属性策略的 RBAC 权限访问控制模型[J].小型微型计算机系统,2013,34(2):328-331 Li Wei-guan,Zhao Feng-yu.RABC Permission Access Control Model with Attribute Policy[J].Mini-micro Systems,2013,4(2):328-331
[11] Fernandez-Gago C,Agudo I,Lopez J.Building Trust from Context Similarity Measures[J].Comput.Stand.Interfaces,2014,36(4):792-800
[12] Bahtiyar S,Caglayan M U.Security Similarity Based Trust inCyber Space[J].Know-Based Syst.2013,52(2):290-301
[13] Rahmani M.Software modeling & design:UML,use cases,patterns,& software architectures by Hassan Gomaa [J].ACM SIGSOFT Software Engineering Notes,2011,36(4):35-45
[14] 林庆国,刘宴兵.一种基于信任的动态访问控制策略[J].重庆邮电大学学报(自然科学版),2010,22(4):478-482 Lin Qing-guo,Liu Yan-bing.A trust-based dynamic access control scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2010,2(4):478-482

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!