Computer Science ›› 2011, Vol. 38 ›› Issue (2): 28-31.
Previous Articles Next Articles
FENG Xiao-sheng,WANG Zhen-wen,LI Xiang-yun
Online:
Published:
Abstract: Traditional access control models which are based on identity are not adaptive in P2P environments, which characterize non-centralization, autonomy and dynamic characteristic. We analyzed the access control issue in P2P environments. The existing trust based role access control lacks measures to distinguish users whose results from a trust model are same. We proposed trust attribut}based access control to deal with this problem. Trust attribute-based access control describes users and resources using user attributes and resource attributes. The model builds user role assignment using user attributes, the result from a trust model, environment attributes and authorization policy and builds role permission assignment using resource attributes and authorization policy.
Key words: Access control, Attribute, P2P
FENG Xiao-sheng,WANG Zhen-wen,LI Xiang-yun. Trust-Attribute-based Access Control in P2P Environments[J].Computer Science, 2011, 38(2): 28-31.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I2/28
Cited