Trust-based access control method and system thereof

A technology of access control and trust, applied in transmission systems, electrical components, etc., can solve the problem that the RBAC model cannot be applied to a distributed collaborative development environment

Active Publication Date: 2012-09-12
山东经伟晟睿数据技术有限公司
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RBAC model also has the disadvantage that it cann...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust-based access control method and system thereof
  • Trust-based access control method and system thereof
  • Trust-based access control method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0124] The present invention will be further described below in conjunction with specific embodiments and accompanying drawings.

[0125] There are two universities H and G, each with a set of course information system for the school, university H has three roles RoleSet H = {teacher, full-time student, part-time student}, university G has two roles RoleSet G = {teacher, student}, and:

[0126] In the role access control implementation scheme of school H:

[0127] ●Teachers have the authority to start courses, view student information, and score;

[0128] ●Full-time students have the authority to choose courses across majors, choose courses in this major, evaluate courses, and study online courses;

[0129] ●Part-time students have the right to choose courses, evaluate courses, and study online courses.

[0130] In the role access control implementation scheme of school G:

[0131] ●Teachers have the authority to start courses, view student information, and score;

[013...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust-based access control method and a system thereof, belonging to the field of computer access control. The trust-based access control method comprises the following steps: 1), establishing a role-trust describing model; 2), for each role r in an autonomous domain B, determining a mapping relationship of a role in another autonomous domain A to the role r, and making mapping of the role in the A to the role in the B meet the mapping relationship; 3), according to the mapping relationship, dividing an authority set of the role r into different authority subsets, and correlating the divided subsets to corresponding trust values; 4), when of a main role in the A accesses resources in the B, analyzing information of the accessing main role first and then mapping the information of the accessing main role to the role in the autonomous domain B, and obtaining a trust value; and 5) according to the role information and the trust value of the accessing main role, determining a resource accessing authority of a current access request by the autonomous domain B. The trust-based access control method and the trust-based access control system effectively compensate for a defect that the conventional role access control cannot adapt to a distributed cooperative development environment.

Description

technical field [0001] The invention relates to a trust degree-based access control method and system thereof. The system expands the traditional role access control model and belongs to the field of computer access control. technical background [0002] Cloud computing is a kind of geographically distributed, heterogeneous computing resources, storage resources, information resources, knowledge resources and other resources interconnected through the network, so as to achieve the purpose of resource sharing and collaborative work. The participating entities of cloud computing are autonomous, and the collaboration between entities is dynamic. Therefore, a key issue of cloud computing is how to implement access control in a dynamically changing environment, that is, how to manage and execute authorization policies. This paper refers to each participating entity and its operating environment in cloud computing as an "autonomous domain". [0003] A typical cloud computing app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 张文博吴恒黄涛何海
Owner 山东经伟晟睿数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products