计算机科学 ›› 2015, Vol. 42 ›› Issue (9): 94-96.doi: 10.11896/j.issn.1002-137X.2015.09.019
吴春琼,黄榕宁
WU Chun-qiong and HUANG Rong-ning
摘要: 访问控制是网络资源共享领域的重要研究内容。为了提高访问控制中对未知节点的预测能力,提出了一种基于动态线性相关的访问控制模型。首先,提出了一种包含服务请求者、服务推荐节点和服务提供者的访问控制结构。其次,提出了一种动态的信任值线性计算方法,该方法将节点的全局信任值表示为直接信任值和推荐信任值的线性组合,并根据节点间的历史记录动态地调整直接信任值和推荐信任值的权重。最后通过仿真实验表明, 提出的访问控制模型与其他相关的访问控制模型相比,不仅具有更高的预测成功率,而且能更好地抵御节点的恶意攻击。
[1] Al-Slamy D N M A.E-Commerce security[J].IJCSNS International Journal of Computer Science and Network Security,2008,8(5):340-344 [2] 李凤华,苏铓,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813 Li Feng-hua,Su Mang,Shi Guo-zhen,et al.Reasearch Status and Development Trend of Access Control Model[J].Acta Electronica Sinica,2012,0(4):805-813 [3] Xiang Y,Ling Y.The Research on Chinese Taxation Policies Based on E-commerce Model Classification [C]∥ISECS’09.Washington DC,USA,2009:431-434 [4] Li Q.Analysis on Channel Information and Control Structure Performance in Food Supply Chain Under E-commerce Environment [C]∥ISISE’09.Washington DC,USA,2009:119-121 [5] Xia Y,Li Q,Wang L.Research on Decentralized E-commerceArchitecture in P2P Environment [C]∥ICECE’10.Washington DC,USA,2010:2929-2932 [6] Fan X,Li M,Ren Y.Dual-EigenRep:A Reputation-Based Trust Model for P2P File-Sharing Networks [C]∥UIC-ATC’10.Washington DC,USA,2010:358-363 [7] Li J,Wang X,Chen Y,et al.A Reputation Management Framework Based on Global Trust Model for P2P Systems [C]∥ICCS’06.Berlin,Heidelberg,2006:896-899 [8] 刘武,段海新,张洪,等.TRBAC:基于信任的访问控制模型[J].计算机研究与发展,2011,48(8):1414-1420 Liu Wu,Duan Hai-xin,Zhang hong,et al.TRBAC:Trust Based Access Control Model[J].Journal of Computer Research and Development,2011,48(8):1414-1420 [9] Mehdi M,Bouguila N,Bentahar J.A QoS-Based Trust Approach for Service Selection and Composition via Bayesian Networks [C]∥ICWS’13.Washington DC,USA,2013:211-218 [10] 李唯冠,赵逢禹.带属性策略的 RBAC 权限访问控制模型[J].小型微型计算机系统,2013,34(2):328-331 Li Wei-guan,Zhao Feng-yu.RABC Permission Access Control Model with Attribute Policy[J].Mini-micro Systems,2013,4(2):328-331 [11] Fernandez-Gago C,Agudo I,Lopez J.Building Trust from Context Similarity Measures[J].Comput.Stand.Interfaces,2014,36(4):792-800 [12] Bahtiyar S,Caglayan M U.Security Similarity Based Trust inCyber Space[J].Know-Based Syst.2013,52(2):290-301 [13] Rahmani M.Software modeling & design:UML,use cases,patterns,& software architectures by Hassan Gomaa [J].ACM SIGSOFT Software Engineering Notes,2011,36(4):35-45 [14] 林庆国,刘宴兵.一种基于信任的动态访问控制策略[J].重庆邮电大学学报(自然科学版),2010,22(4):478-482 Lin Qing-guo,Liu Yan-bing.A trust-based dynamic access control scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2010,2(4):478-482 |
No related articles found! |
|