• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.
Citation: Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.

TRBAC: Trust Based Access Control Model

More Information
  • Published Date: August 14, 2011
  • Access control is a process which controls users to execute some operations or access some network resources according to the users identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity andor groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.
  • Related Articles

    [1]Li Zhenyu, Ding Yong, Yuan Fang, Zhang Kun. An Integrated Protection Method of Moving Target Defense and Access Control Based on IPv6 Network[J]. Journal of Computer Research and Development, 2022, 59(5): 1105-1119. DOI: 10.7544/issn1000-1239.20211118
    [2]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [3]Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
    [4]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [5]Chen Feng, Liu Dehui, Zhang Yi, Su Jishu. A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954.
    [6]Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.
    [7]Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on User Behavior Trust in Trustworthy Network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.
    [8]Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153.
    [9]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.
    [10]Shi Zhiguo, He Yeping, Zhang Hong. A Time Self-Decay Trust Management Algorithm for P2P Computing Security[J]. Journal of Computer Research and Development, 2007, 44(1): 1-10.

Catalog

    Article views (1296) PDF downloads (836) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return