Method for generating cross-domain access control strategy by rising from credit assessment to trust management

An access control policy and trust management technology, applied in the field of cross-domain access control policy generation, can solve the problem that it is difficult to dynamically formulate finer-grained policies, and achieve the effect of convenient and seamless integration

Inactive Publication Date: 2012-01-04
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new method uses an Access Control Strategy Language (X ACML) that simplifies how it can be transformed from different ways for integration purposes within older systems without compromising its effectiveness or functionality.

Problems solved by technology

Technological Problem addressed in this patents relating to improving flexibility in accessing remote devices over internet protocol networks has been challenging due to lack of confidence in validated identity verification measures like creditworthiness ratings and trust governance. Companionship refers to combining reliability and ease of access into multiple levels of trust. However, existing methods either require separate validation sources or rely heavily on weaknesses derived from past experiences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: the present embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to Examples described below.

[0033] This embodiment includes the following steps:

[0034] Step 1: Establish and implement an uncertain reputation evaluation model. For the randomness and ambiguity of reputation, this embodiment combines the cloud model proposed by Li Deyi et al. and Bayesian network for representation and evaluation of reputation.

[0035] Reputation T is a quantitative concept on domain space U=[0, n] (n is any positive integer), represented by reputation cloud T(Ex, En, He), where Ex is expected value, En is entropy, He is the super-entropy. A rating r ∈ U from other entit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating a cross-domain access control strategy by rising from credit assessment to trust management. According to the method, a credit assessment model is established to realize a corresponding credit assessment subsystem; uncertainty assessment is carried out on a credit degree of an evaluated entity according to evaluation information given by an interaction entity; association relations between an attribute of an assessment entity, an attribute of an assessed entity, a resource attribute, a behavior attribute, an environment attribute and an entity credit degree are extracted; and then an access control strategy based on attributes is generated and description is carried out by an extensible access control mark language; at last, the generated access control strategy is converted into a strategy of a concrete trust management system. According to the invention, authorization strategy is generated dynamically according to behavior and environment attributes of an entity; and the method has good self adaptability and can be applied to cross-domain environments like cloud calculating having a lot of unfamilar entities.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products