Supercharge Your Innovation With Domain-Expert AI Agents!

Access control method based on dynamic trust thresholds

An access control and trust value technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of not being able to obtain all information, and the access control technology based on identity or role cannot fully meet the security needs of an open dynamic network, so as to ensure security performance and meet the needs of dynamic access control

Inactive Publication Date: 2015-07-15
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, in an open network, the same entity can be both a resource or service provider and a resource user. There is no central authoritative node to rely on, and an entity cannot obtain all information about another entity.
[0003] Due to the dynamic and heterogeneous characteristics of open networks, traditional identity-based or role-based access control technologies cannot fully meet the security needs of open and dynamic networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on dynamic trust thresholds
  • Access control method based on dynamic trust thresholds
  • Access control method based on dynamic trust thresholds

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in detail below through specific embodiments.

[0034] Specific application examples:

[0035] (1) All permissions that can be assigned to the subject for the file File are: Read, Write, Modify, Print, Copy, and the trust thresholds of the corresponding permissions are: ε_read=0.4, ε_write=0.7, ε_modify=0.9, ε_print= 0.5, ε_copy=0.7.

[0036] (2) The permission sets of the file File are: R 0 ={Read},R 1 ={Print},R 2 = {Write, Copy}, R 3 ={Modify}, the trust thresholds of the corresponding permission sets are: ε 0 = 0.4, ε 1 = 0.5, ε 2 =0.7,ε 3 = 0.9.

[0037] (3) The file File has an allocation record table for each permission set, that is, it has 4 permission set allocation record tables. The structure of the allocation record table of each authority set is: subject identification, subject trust value, access authority, and access feedback evaluation. Each record in the allocation record table stores the details of eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an access control method based on dynamic trust thresholds. The method comprises: 1) merging permissions having identical trust value requirements for an access subject into the same permission set, wherein an object has a plurality of permissions and a trust threshold is set for each permission; 2) creating a permission distribution record table for each permission set; 3) when a subject sends an access request to the object, inspecting whether the trust value of the subject satisfies the requirements or not; if so, allowing the access request and recording the access into the permission distribution record table of the corresponding permission set; if not, refusing to perform; and 4) adjusting the trust threshold of the permission corresponding to the object: after the access is fed back and evaluated as fraud and the set number of times is exceeded, performing increasing adjustment on the trust threshold and updating the permission distribution record table; and if the access is fed back and evaluated as no fraud behavior, performing decreasing adjustment on the trust threshold and updating the permission distribution record table. The access control method of the present invention can flexibly realize access control on resources.

Description

technical field [0001] The invention belongs to the field of computer network security, and specifically relates to an access control method based on a dynamic trust threshold, which is used to solve the problem of how to assign permissions according to the trust value when an entity accesses resources in an open network, and can realize detailed access permissions. Granular management. Background technique [0002] With the rapid development and wide application of computer network technology, the current network has developed from an early closed network to an open network facing a large number of external users. In an open network, the behavior and state of entities have strong autonomy and uncertainty. Entities can join a network to obtain resources and services at any time, and can also disconnect from the network at any time, or even rejoin other networks after changing their identity. In addition, in an open network, the same entity can be both a resource or service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 马书南林东岱
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More