Computer Science ›› 2015, Vol. 42 ›› Issue (9): 94-96.doi: 10.11896/j.issn.1002-137X.2015.09.019

Previous Articles     Next Articles

Dynamic Linear Relevance Based Access Control Model

WU Chun-qiong and HUANG Rong-ning   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The research of access control is an important issue in resource sharing based on networks.In order to improve the prediction ability of access control for unknown nodes,this paper proposed a dynamic linear relevance based access control model.Firstly,we proposed an architecture of access control containing service requestor,service recommendation node and service provider.Then,we proposed a dynamic trust score linear computing approach.The proposed approach represents the global trust score of node with the linear combination of direct trust score and recommendation trust score,and adjusts the weights of direct trust score and recommendation trust score with history records between nodes.Finally,the simulation experiments show that,compared with related access control models,the proposed model has higher prediction success rate,and can resist malicious attacks more efficiently.

Key words: Access control,Trust recommendation,Trust model,Linear combination

[1] Al-Slamy D N M A.E-Commerce security[J].IJCSNS International Journal of Computer Science and Network Security,2008,8(5):340-344
[2] 李凤华,苏铓,史国振,等.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813 Li Feng-hua,Su Mang,Shi Guo-zhen,et al.Reasearch Status and Development Trend of Access Control Model[J].Acta Electronica Sinica,2012,0(4):805-813
[3] Xiang Y,Ling Y.The Research on Chinese Taxation Policies Based on E-commerce Model Classification [C]∥ISECS’09.Washington DC,USA,2009:431-434
[4] Li Q.Analysis on Channel Information and Control Structure Performance in Food Supply Chain Under E-commerce Environment [C]∥ISISE’09.Washington DC,USA,2009:119-121
[5] Xia Y,Li Q,Wang L.Research on Decentralized E-commerceArchitecture in P2P Environment [C]∥ICECE’10.Washington DC,USA,2010:2929-2932
[6] Fan X,Li M,Ren Y.Dual-EigenRep:A Reputation-Based Trust Model for P2P File-Sharing Networks [C]∥UIC-ATC’10.Washington DC,USA,2010:358-363
[7] Li J,Wang X,Chen Y,et al.A Reputation Management Framework Based on Global Trust Model for P2P Systems [C]∥ICCS’06.Berlin,Heidelberg,2006:896-899
[8] 刘武,段海新,张洪,等.TRBAC:基于信任的访问控制模型[J].计算机研究与发展,2011,48(8):1414-1420 Liu Wu,Duan Hai-xin,Zhang hong,et al.TRBAC:Trust Based Access Control Model[J].Journal of Computer Research and Development,2011,48(8):1414-1420
[9] Mehdi M,Bouguila N,Bentahar J.A QoS-Based Trust Approach for Service Selection and Composition via Bayesian Networks [C]∥ICWS’13.Washington DC,USA,2013:211-218
[10] 李唯冠,赵逢禹.带属性策略的 RBAC 权限访问控制模型[J].小型微型计算机系统,2013,34(2):328-331 Li Wei-guan,Zhao Feng-yu.RABC Permission Access Control Model with Attribute Policy[J].Mini-micro Systems,2013,4(2):328-331
[11] Fernandez-Gago C,Agudo I,Lopez J.Building Trust from Context Similarity Measures[J].Comput.Stand.Interfaces,2014,36(4):792-800
[12] Bahtiyar S,Caglayan M U.Security Similarity Based Trust inCyber Space[J].Know-Based Syst.2013,52(2):290-301
[13] Rahmani M.Software modeling & design:UML,use cases,patterns,& software architectures by Hassan Gomaa [J].ACM SIGSOFT Software Engineering Notes,2011,36(4):35-45
[14] 林庆国,刘宴兵.一种基于信任的动态访问控制策略[J].重庆邮电大学学报(自然科学版),2010,22(4):478-482 Lin Qing-guo,Liu Yan-bing.A trust-based dynamic access control scheme[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2010,2(4):478-482

No related articles found!
Full text



No Suggested Reading articles found!