Method for generating cross-domain access control strategy by rising from credit assessment to trust management

An access control policy and trust management technology, applied in the field of cross-domain access control policy generation, it can solve the problem that it is difficult to dynamically formulate more fine-grained policies, and achieve the effect of convenient and seamless integration

Inactive Publication Date: 2014-04-23
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method centering on trust management and using reputation evaluation as an adjustment mechanism does not fundamentally solve the problem, and the adaptation to the dynamic environment is limited to the scope stipulated by the pre-set trust management strategy. A finer-grained policy that specifically applies the behavioral characteristics of an entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management
  • Method for generating cross-domain access control strategy by rising from credit assessment to trust management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: the present embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to Examples described below.

[0033] This embodiment includes the following steps:

[0034] Step 1: Establish and implement an uncertain reputation evaluation model. For the randomness and ambiguity of reputation, this embodiment combines the cloud model proposed by Li Deyi et al. and Bayesian network for representation and evaluation of reputation.

[0035] Reputation T is a quantitative concept on domain space U=[0, n] (n is any positive integer), represented by reputation cloud T(Ex, En, He), where Ex is expected value, En is entropy, He is the super-entropy. A rating r ∈ U from other entit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating a cross-domain access control strategy by rising from credit assessment to trust management. According to the method, a credit assessment model is established to realize a corresponding credit assessment subsystem; uncertainty assessment is carried out on a credit degree of an evaluated entity according to evaluation information given by an interaction entity; association relations between an attribute of an assessment entity, an attribute of an assessed entity, a resource attribute, a behavior attribute, an environment attribute and an entity credit degree are extracted; and then an access control strategy based on attributes is generated and description is carried out by an extensible access control mark language; at last, the generated access control strategy is converted into a strategy of a concrete trust management system. According to the invention, authorization strategy is generated dynamically according to behavior and environment attributes of an entity; and the method has good self adaptability and can be applied to cross-domain environments like cloud calculating having a lot of unfamilar entities.

Description

technical field [0001] The invention belongs to the field of computer network security, in particular to the field of access control in a multi-trust domain environment, and specifically relates to a cross-domain access control strategy generation method that is upgraded from reputation evaluation to trust management. Background technique [0002] Reasonable authorization and access control is an urgent problem to be solved for new Internet applications such as cloud computing and Internet of Things, and it is also the key to whether these new computing models can carry core services. Traditional authentication-based authorization is only suitable for closed, familiar user groups and relatively static environments, and it is difficult to adapt to open, public-accessible dynamic environments. In recent years, a large number of domestic and foreign scholars have studied the issue of secure access in an open environment from the perspective of how to dynamically establish trust...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 王勇金波刘振岩薛静锋马锐
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products