计算机科学 ›› 2013, Vol. 40 ›› Issue (2): 78-83.

• 网络与通信 • 上一篇    下一篇

普适计算环境下基于模糊ECA规则的访问控制方法

张立臣,王小明,窦文阳,刘 丁   

  1. (陕西师范大学计算机科学学院 西安710062);(陕西师范大学非线性综合集成实验室 西安710062)
  • 出版日期:2018-11-16 发布日期:2018-11-16

Access Control Method Based on Fuzzy ECA Rules for Pervasive Computing Environments

  • Online:2018-11-16 Published:2018-11-16

摘要: 上下文信息是普适访问控制的关键因素,对主体授权和权限使用过程具有决定性影响。普适计算环境下,主体权限、资源访问控制强度和安全策略应随上下文的变化而动态自调节。已有访问控制模型均未考虑上下文对普适环境下访问控制的主动性影响,使得访问控制的主动性和自适应性较差。为了描述上下文对普适访问控制中主体权限、访问控制强度和安全策略的主动性影响,通过对传统ECA规则进行模糊扩展,设计了一种基于区间值模糊集合理论的模糊ECA规则模式,提出了基于模糊ECA规则模式的主动访问控制方法,使授权和访问控制自适应于普适计算环境。

关键词: 访问控制,主动访问控制,区间值模糊推理,模糊ECA规则,普适计算

Abstract: Context information is one of the key factors in pervasive access control systems,which exerts a decisive influence on authorization and access control on subjects. Permissions of the subjects,threshold intensity of the resources and security policies of the system should be automatically adjusted as the changes of the context information in pervasive computing environment, without thorough consideration by current access control models. In order to describe the active influence of fuzzy context information on pervasive access control (permissions of the subjects, the threshold intensity and the security policies of the system),based on the traditional ECA rules and the intcrvalfuzzy set thcory,a fuzzy ECA rule scheme was designed, and an active access control method was proposed based on the proposed fuzzy ECA rule scheme. By applying the new access control method, the pervasive access control can be self-adjusted in the pervasroc cnmronmcnts.

Key words: Access control, Active access control, Interval-valued fuzzy reasoning, Fuzzy ECA rule, Pervasive computing

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!