Cross-domain security access control method based on credibility

A security access control and trustworthiness technology, applied in the field of network information data security, can solve the problems that are not conducive to global access control, coarse access granularity, etc.

Inactive Publication Date: 2015-06-24
HENAN POLYTECHNIC UNIV
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of access control, the traditional access control model will have great security risks, and the traditional access control model mainly solves the access control of a single security domain
Therefore, it is not suitable for open network environments, and the access granularity is relatively coarse, which is not conducive to the realization of unified global access control.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain security access control method based on credibility
  • Cross-domain security access control method based on credibility
  • Cross-domain security access control method based on credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and specific embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] Such as figure 1 As mentioned above, and it is assumed that when the user conducts cross-domain access, the access subject is marked as S:

[0036] The first step is to initialize entity attribute information. The attribute management system AMS establishes a unified definition, unified access control rule semantics and sensitive attribute information for each entity in the attribute library of each domain, that is, subject S and attribute SA, object R and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cross-domain security access control method based on the credibility. The cross-domain security access control method based on the credibility comprises the that entity attribute information is initialized, a certificate is registered, an access request is sent, the credibility and sensitive information are verified, information is submitted and sent, information communication is conducted, and the credibility is re-checked. According to the cross-domain security access control method based on the credibility, the credibility attribute, the aging attribute, a time attenuation function and the sensitive attribute information are added based on a traditional cross-domain access control method, in this way, on one hand, the sensitive attribute is protected by comparing a credibility value with a sensitive attribute value, the final roles of a user is determined according to other attributes of the user after a role set of users is determined through the credibility values of the users, and the access right of a subject is determined according to an access control policy; on the other hand, the problem that the user behaves well at the early stage and conducts hostile attacks at the later stage can be solved, and system access security and reliability are greatly improved.

Description

technical field [0001] The invention belongs to the technical field of network information data security, and in particular relates to a trust-based cross-domain security access control method. Background technique [0002] Aiming at the security access problem of access subjects, researchers mainly use access control mechanism to effectively block illegal subjects from accessing node resources. However, in the environment of the Internet of Things, due to the diversity of terminal types, wide distribution range, heterogeneity of network types, mobility of nodes and complexity of business applications, the access and access control mechanism of the Internet of Things becomes difficult. Complexity and variety, especially the problem of secure access to cross-domain resources caused by the application of cloud storage technology, further increases the complexity of terminal device access and access control. [0003] Traditional access control models mainly include discretiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/14
Inventor 彭维平刘雪贞张敏宋成赵娜贾宗璞王冠琼
Owner HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products