Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains

A technology of access control and trust domain, applied in the field of access control based on computable reputation, which can solve the problems of large amount of storage and calculation, too fine-grained, lack of etc.

Inactive Publication Date: 2010-11-17
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former lacks the necessary trust feedback mechanism to flexibly adjust the authorization strategy; the latter is too fine-grained, because the amount of storage and calculation based on a single individual trust is very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains
  • Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains
  • Calculable creditworthiness-based access control method under distributed environment of multiple trusting domains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention are described in detail below in conjunction with accompanying drawings: this example is carried out under the premise of technical solution of the present invention, has provided detailed implementation and specific operation process, but protection scope of the present invention is not limited to the following the embodiment.

[0053] This example includes the following steps:

[0054] Step 1: The user logs in to the target trust domain and undergoes role mapping and role conversion to obtain a local role set. Since each role conversion may generate a new target role and delete the old source role, the local role set is based on behavior A dynamically changing collection of .

[0055] Such as figure 1 As shown, in this embodiment, the target character is connected to the local character set, and there is a feedback update process. The local role set can contain multiple roles, but after each user action is executed, only one tar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a calculable creditworthiness-based access control method under the distributed environment of multiple trusting domains in the technical field of network. The method comprises the following steps of: logging in a target trusting domain by a user, and giving the trusting domain a role set of the user by role mapping and role changing; trying acquiring resource informationin the target domain by the user; inquiring a delegated strategy database; updating user behavior variable values in an accumulation behavior library, and updating the times of executing user behaviors corresponding to outland roles in a behavior evaluating library; changing the role on the basis of the behavior; generating behavior evaluation vectors, and calculating a fame value of the role; and regulating a role mapping strategy related to the role. The method realizes dynamic trust management of role mapping, role changing and fame feedback, improves interaction capacity between the trusting domains and the user, improves flexibility, security and reliability of access control in the trusting domains, and effectively solves the problems of user authorization and resource management inservice of network systems by taking the user behavior as trusted evaluation objects.

Description

technical field [0001] The invention relates to an access control method in the field of network technology, in particular to an access control method based on computable reputation in a distributed multi-trust domain environment. Background technique [0002] With the widespread popularization and application of network systems and resource sharing, the security of service providers is being challenged more and more. Sites such as the very popular Blog system, forum communities, online reading and e-stores all belong to an independent service provider. Each service provider can independently implement different access control policies for different user groups, thus forming a trust domain entity. The traditional attribute-based access control method is obviously unable to cope with the huge number of users and complex cross-domain operations, but trust has its unique properties. Applying trust to computer and network technology is an effective way to deal with such uncerta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/08H04L29/06G06F21/60
CPCG06F21/604G06F21/00G06F2221/2141H04L63/105
Inventor 李斓黄恺李建华蔡伟范磊
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products