Computer Science ›› 2013, Vol. 40 ›› Issue (6): 132-137.

Previous Articles     Next Articles

Research on Secure Distributed Access Control System for Ubiquitous Computing

DOU Wen-yang,WANG Xiao-ming and ZHANG Li-chen   

  • Online:2018-11-16 Published:2018-11-16

Abstract: This paper designed a secure distributed access control system for complex security requirements in ubiquitous computing environment and the system architecture was presented.A authorization query algorithm was proposed to solve the problem of the efficiency of authorization query.Fuzzy reasoning machine was proposed to achieve fuzzy authorization.Finally,an encryption mechanism was presented to ensure the confidentiality and integrity of information during the process of authorization query.

Key words: Ubiquitous computing,Fuzzy access control,Interval-valued fuzzy reasoning,Distributed authorization

[1] Welser M.The computer of the 21’st Century[J].Scientific American,1991,5(3):66-75
[2] Michael F,Oliver R.Ubiquitous computing:An overview oftechnology impacts[J].Telematics and Informatics,2011,28(2):55-65
[3] Mieso K,Denko,Tao S,et al.Trust management in ubiquitous computing:A bayesin approach[J].Computer Communications,2010,34(3):398-406
[4] Jalal A M,Raquel H.Access control using threshold cryptography for ubiquitous computing environments[J].Journal of King Saud University Computer and Information Sciences,2011,34(1):1-8
[5] 林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,8(4):955-966
[6] 翟浩良,韩道军,李磊.基于情景演算的动态访问控制模型[J].计算机科学,2012,9(6):35-38
[7] Youna J,James B D.CRiBAC:Community-centric role interaction based access control model[J].Computers Security,2012,3(1):497-523
[8] Rafael T,Carlos M,Altair S.Applying a usage control model in an operating system kernel[J].Journal of Network and Computer Applications,2011,4(3):1342-1352
[9] Tao W,Zhang G Q.Trusted interaction approach for dynamicservice selection using multi-criteria decision making technique[J].Knowledge Based Systmes,2012,2(5):116-122
[10] 封孝生,王桢文,黎湘运.P2P中基于信任和属性的访问控制[J].计算机科学,2011,8(2):28-31
[11] Denko M K,Tao S,Issac W.Trust management in ubiquitous computing:A Bayesian approach[J].Computer Communications,2011,34(2):398-406
[12] Ding Y S,Liu F M,Tang B Y.Context-sensitive trust computing in distributed environments[J].Knowledge Based Systems,2012,28(11):105-114
[13] Bernd B.Ontology driven health information systems architectures enable pHealth for empowered patients[J].International Journal of Medical Informatics,2011,0(5):17-25
[14] Anisetti M,Ardagna C A,Bellandi V,et al.OpenAmbient:aPervasive Access Control Architecture[M].Security in Autonomous Systems,2006:160-172
[15] Vassilis K,Loukas H,Dimitris K,et al.A dynamic contex-taware access control architecture for e-services[J].Computers Security,2006,5(7):507-521
[16] Takabi,Amini,Jalili.Enhancing role-based access control model through fuzzy Relations[J].Information Assurance and Security,2007,5(3):131-136
[17] Zhang S,He D K.Fuzzy model for trust evaluation[J].Journal of Southwest Jiaotong University,2006,4(1):23-28
[18] 窦文阳,王小明,张立臣.普适计算环境下的动态模糊访问控制模型研究[J].计算机科学,2010,7(9):63-37
[19] Chen S M,Li W,Liu H C,et al.Multiattribute decision making based on interval-valued intuitionistic fuzzy values[J].Expert System with Applications,2012,9(13):343-351
[20] Sevastjanow P,Dymova L,Barosiewicz P.A new approach to normalization of interval and fuzzy weights[J].Fuzzy Sets and Systems,2012,8(2):34-45

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!