• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.
Citation: Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.

A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk

More Information
  • Published Date: June 14, 2009
  • The rapid development of Internet and related technologies has created tremendous possibilities for the interoperability between applications in open and heterogeneous distributed environment. Interoperability provides a means for distributed applications to share resources and services, which improves performance and resource utilization. Access control is a crucial security technology. It can control the legal users to sensitive resources effectively and ensure users to access relative resource. For the complexity of the multi-domain environment and the ceaseless evolvement of the information secure share, the traditional access control method can not ensure the absolute security for the exchange of data resource. Traditional access control model can not satisfy the requirement of the dynamic of the multi-domain environment. Through introducing the concept of risk, the authors propose a dynamic access control model for multi-domain environment based on the risk of inter-operations. The risk grade of an access policy can be calculated by the history of the inter-operations among domains; the security degree of the objects and the safety factor of the access events. Through adjusting the access policies which have high risk grade, the risk in the system can be controlled in real time. The analysis of the security theory shows that this method can reinforce the facility of the access control and the security of the multi-domain environment.
  • Related Articles

    [1]Zhang Wei, Han Linyu, Zhang Dianlei, Ren Pengjie, Ma Jun, Chen Zhumin. GeoPMF: A Distance-Aware Tour Recommendation Model[J]. Journal of Computer Research and Development, 2017, 54(2): 405-414. DOI: 10.7544/issn1000-1239.2017.20150822
    [2]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [3]Yang Liu, Yu Jian, Jing Liping. An Adaptive Large Margin Nearest Neighbor Classification Algorithm[J]. Journal of Computer Research and Development, 2013, 50(11): 2269-2277.
    [4]Zhao Xiaoming, Ye Xijian. A New Approach to Ridgelet Transform[J]. Journal of Computer Research and Development, 2008, 45(5): 915-922.
    [5]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.
    [6]Liu Bing, Wang Wei, and Shi Baile. The Tight Estimation Distance Using Wavelet[J]. Journal of Computer Research and Development, 2006, 43(10): 1732-1737.
    [7]Ming Xing, Liu Yuanning, Zhu Xiaodong, Xu Tao. Iris Recognition Based on Wavelet Transform with Shift Invariance Preprocessing[J]. Journal of Computer Research and Development, 2006, 43(7): 1186-1193.
    [8]Song Chuanming, Wang Xianghai. A Shape Adaptive Integer Wavelet Coding Algorithm Based on New Quantization Scheme[J]. Journal of Computer Research and Development, 2006, 43(4): 695-701.
    [9]Ji Qijin and Dong Yongqiang. Self-Similar Traffic Synthesizing Using Gaussian Mixture Model in Wavelet Domain[J]. Journal of Computer Research and Development, 2006, 43(3): 389-394.
    [10]Shang Zhaowei, Zhang Mingxin, Zhao Ping, Shen Junyi. Different Complex Wavelet Transforms for Texture Retrieval and Similarity Measure[J]. Journal of Computer Research and Development, 2005, 42(10): 1746-1751.

Catalog

    Article views (755) PDF downloads (591) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return