• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Hao, Feng Dengguo, Qin Yu, Yu Aimin. An Approach of Trusted Usage Control in Distributed Environment[J]. Journal of Computer Research and Development, 2011, 48(12): 2201-2211.
Citation: Hu Hao, Feng Dengguo, Qin Yu, Yu Aimin. An Approach of Trusted Usage Control in Distributed Environment[J]. Journal of Computer Research and Development, 2011, 48(12): 2201-2211.

An Approach of Trusted Usage Control in Distributed Environment

More Information
  • Published Date: December 14, 2011
  • In distributed environment, digital data can be easily distributed and various kinds of security requirements emerge after the data distribution. However, traditional access control solutions suffer from difficulties both in the access rights authorization and the usage policy enforcement, especially under the heterogeneous, distributed network environments. In this paper, a new architecture called TUC (trusted usage control) is proposed against the information security requirements under distributed environment based on usage control model and trusted computing technology. TUC is presented to achieve usage control based upon the hardware trust root TPM. In this way, confidentiality, integrity and controllability of the data are assured not only in distribution, transmission, storage but also in usage control. It is necessary to design TUC as a general access solution by binding policies to the usage-controlled digital content. So TUC isn't limited to the specific application environment. Moreover, TUC is a negotiable solution because of the key and policy negotiation in our design. In this way, both the user's and the owner's requirements are taken into consideration. The design and implementation of TUC is then detailed in this paper. Test results show that the performance of TUC is acceptable for access control in distributed environment.
  • Related Articles

    [1]Wu Wenlong, Yin Hailian, Wang Ning, Xu Mengfei, Zhao Xinzhe, Yin Zhanzuo, Liu Yuanrui, Wang Haofen, Ding Yan, Li Bohan. A Synergetic LLM-KG Framework for Cross-Domain Heterogeneous Data Query[J]. Journal of Computer Research and Development, 2025, 62(3): 605-619. DOI: 10.7544/issn1000-1239.202440634
    [2]Wang Mengru, Yao Yunzhi, Xi Zekun, Zhang Jintian, Wang Peng, Xu Ziwen, Zhang Ningyu. Safety Analysis of Large Model Content Generation Based on Knowledge Editing[J]. Journal of Computer Research and Development, 2024, 61(5): 1143-1155. DOI: 10.7544/issn1000-1239.202330965
    [3]Guo Jiang, Wang Miao, Zhang Yujun. Content Type Based Jumping Probability Caching Mechanism in NDN[J]. Journal of Computer Research and Development, 2021, 58(5): 1118-1128. DOI: 10.7544/issn1000-1239.2021.20190871
    [4]Li Li, Liu Huanyu, Lu Laifeng. Probabilistic Caching Content Placement Method Based on Content-Centrality[J]. Journal of Computer Research and Development, 2020, 57(12): 2648-2661. DOI: 10.7544/issn1000-1239.2020.20190704
    [5]Wang Yishu, Yuan Ye, Liu Meng, Wang Guoren. Survey of Query Processing and Mining Techniques over Large Temporal Graph Database[J]. Journal of Computer Research and Development, 2018, 55(9): 1889-1902. DOI: 10.7544/issn1000-1239.2018.20180132
    [6]Huang Sheng, Teng Mingnian, Wu Zhen, Xu Jianghua, Ji Ruijun. A Data Caching Scheme Based on Node Classification in Named Data Networking[J]. Journal of Computer Research and Development, 2016, 53(6): 1281-1291. DOI: 10.7544/issn1000-1239.2016.20148097
    [7]Li Ruimin, Lin Hongfei, Yan Jun. Mining Latent Semantic on User-Tag-Item for Personalized Music Recommendation[J]. Journal of Computer Research and Development, 2014, 51(10): 2270-2276. DOI: 10.7544/issn1000-1239.2014.20130342
    [8]Wang Zhurong, Li Wei, Zhu Bilei, Li Xiaoqiang. Audio Authentication Based on Music Content Analysis[J]. Journal of Computer Research and Development, 2012, 49(1): 158-166.
    [9]Huang Zhenhua and Wang Wei. An Algebra for Skyline Query Processing Data Cube[J]. Journal of Computer Research and Development, 2007, 44(6): 990-999.
    [10]Zheng Guibin, Han Jiqing. Automatic Music Transcription Based on Harmonic Structure Information[J]. Journal of Computer Research and Development, 2006, 43(12): 2187-2192.

Catalog

    Article views (642) PDF downloads (630) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return