计算机集成制造系统 ›› 2018, Vol. 24 ›› Issue (第8): 1983-1995.DOI: 10.13196/j.cims.2018.08.010

• 当期目次 • 上一篇    下一篇

基于多步动态信任评价的任务—角色基访问控制模型

张文芳1,2,董冠群1,2,王小敏1,吴文丰1,2   

  1. 1.西南交通大学信息科学与技术学院
    2.西南交通大学信息安全与国家计算网格四川省重点实验室
  • 出版日期:2018-08-31 发布日期:2018-08-31
  • 基金资助:
    国家自然科学基金资助项目(61371098);四川省科技计划重大科技专项资助项目(2017GZDZX0002);四川省科技计划重点研发资助项目(2018GZ0195);四川省定向财力转移支付资助项目(2017SZYZF0002)。

Task-role based access control model based on dynamic multifactorial trust evaluation

  • Online:2018-08-31 Published:2018-08-31
  • Supported by:
    Project supported by the National Natural Science Foundation,China(No.61371098),the Major Special Project of Sichuan Provincial Science and Technology Program,China(No.2017GZDZX0002) ,the Key Project of Sichuan Provincial Science and Technology Program,China(No.2018GZ0195),and the Sichuan Provincial Directional Financial Transfer Payment Project ,China(No.2017SZYZF0002).

摘要: 针对现有分布式系统中访问控制模型的局限性,采用模糊综合评判和概率统计相结合的方法,提出一种基于多步动态信任评价的任务—角色基访问控制模型(T-RBAC)。所提出的多步动态信任评价算法能够动态度量分布式系统各实体间建立信任关系时的多种信任属性并加以综合评判,使信誉值变化更符合慢增骤降的客观规律,具有更强的抗攻击能力。基于该算法构建的T-RBAC访问控制模型,能够显著提高信任度随任务、角色、访问行为等上下文环境变化的动态适应能力,并具有更细的访问控制粒度和更高的安全性。

关键词: 信任评价, 基于任务&mdash, 角色的访问控制, 分布式系统, 模糊数学

Abstract: To realize secure sharing of information in distributed systems,a dynamic multi-step quantified trust evaluation algorithm was presented by combining fuzzy judgment with statistic theory,and a fine-grained Task-Role Based Access Control (T-RBAC) model based on multi-step quantified trust evaluation was constructed.The proposed multi-step quantified trust evaluation algorithm could dynamic measure the multiple elements of trust and assess trust value synthetically with execution context,which made the trust value accord with the characteristic of increasing slowly but decreasing rapidly,and have the ability of security attacks.Experiments and analyses showed that the T-RBAC model could improve the dynamic adaptability of trust with context changes and obtain the secure access control solution for large-scale distributed systems can be obtained.

Key words: trust evaluation, task-role based access control, distributed system, fuzzy mathematics

中图分类号: