Journal on Communications ›› 2013, Vol. 34 ›› Issue (9): 1-9.doi: 10.3969/j.issn.1000-436x.2013.09.001
• Academic paper • Next Articles
Zhi-qiang YAO1,2,Jin-bo XIONG1,2,Jian-feng MA1,Qi LI1,Xi-meng LIU3
Online:
2013-09-25
Published:
2017-07-05
Supported by:
Zhi-qiang YAO,Jin-bo XIONG,Jian-feng MA,Qi LI,Xi-meng LIU. Community field-centric trust-based access control model[J]. Journal on Communications, 2013, 34(9): 1-9.
"
访问控制模型融合的元素 | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 本文 |
发挥上下文信息 | v | v | v | v | v | v | v | v | × | × | v | × | v | × | × | v | v |
支持交互 | v | v | × | × | × | × | × | v | v | × | v | v | × | v | v | × | v |
支持协作 | v | v | × | × | × | × | × | v | v | v | v | v | × | v | v | × | v |
参考上下文的信任等级 | × | × | × | × | × | × | × | × | × | × | v | × | v | × | × | v | v |
参考日志记录的信任等级 | × | × | × | × | × | × | × | × | × | × | × | v | v | × | v | × | v |
参考推荐元素的信任等级 | × | × | × | × | × | × | × | × | × | × | × | × | v | v | v | × | v |
[1] | JUNG Y , JOSHI J B D . CRiBAC:community-centric role interaction based access control model[J]. Computers & Security, 2012,31(4): 497-523. |
[2] | KUMAR M,SHIRAZI B A , DAS S K , et a l . PICO:a middleware framework for pervasive computing[J]. IEEE Pervasive Computing, 2003,2(3): 72-79. |
[3] | JUNG Y , KIM M . Situation-aware community computing model for developing dynamic ubiquitous computing systems[J]. Journal of Universal Computer Science, 2010,16(15): 2139-2174. |
[4] | SANDHU R S , COYNE E J , FEINSTEIN H L . Role-based access control models[J]. IEEE Computer, 1996,29(2): 38-47. |
[5] | JUNG Y , KIM M , MASOUMZADEH A ,et al. A survey of security issue in multi-agent systems[J]. Artificial Intelligence Review, 2012,37(3): 239-260. |
[6] | JUNG Y , MASOUMZADEH A , JOSHI J B D ,et al. RiBAC:role interaction based access control model for community computing[A]. Proceedings of the 4th International Conference on Collaborative Computing:Networking,Applications and Worksharing (CollaborateCom’08)[C]. Orlando,FL,USA, 2009,10(3): 304-321. |
[7] | 郎波 . 面向分布式系统访问控制的信任度量化模型[J]. 通信学报, 2010,31(12): 45-54. LANG B . Access control oriented quantified trust degree representation model for distributed systems[J]. Journal on Comm nications, 2010,31(12): 45-54. |
[8] | BHATTI R , BERTINO E , GHAFOOR A . A trust-based context-aware access control model for web-services[J]. Distributed and Parallel Databases, 2005,18(1): 83-105. |
[9] | 朱友文, 黄刘生, 陈国良 ,等. 分布式计算环境下的动态可信度评估模型[J]. 计算机学报, 2011,34(1): 55-64. ZHU Y W , HUANG L S , CHEN G L ,et al. Dynamic trust evaluation model under distributed computing environment[J]. Chinese Journal of Computers, 2011,34(1): 55-64. |
[10] | ILTAF N , GHAFOOR A , HUSSAIN M . Modeling interaction us ng trust and recommendation in ubiquitous computing environment[J]. EURASIP Journal on Wireless Communications and Networking, 2012,(1): 1-13. |
[11] | CHAKRABORTY S , RAY I . TrustBAC:integrating trust relationships into the RBAC model for access control in open systems[A]. Proceeding of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT’06)[C]. Lake Tahoe,CA,USA, 2006. 49-58. |
[12] | 石志国, 贺也平, 张宏 . 一种对等计算安全性的时间自衰减信任管理算法[J]. 计算机研究与发展, 2007,44(1): 1-10. SHI Z G , HE Y P , ZHANG H . A time self-decay trust management algorithm for P2P computing security[J]. Journal of Computer Research and Development, 2007,44(1): 1-10. |
[13] | DAMIANI M L , BERTINO E , CATANIA B ,et al. GEO-RBAC:A spatially aware RBAC[J]. ACM Transactions on Information and System Security (TISSEC), 2007,10(1): 21-42. |
[14] | KULKARNI D , TRIPATHI A . Context-aware role-based access control in pervasive computing systems[A]. Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT’08)[C]. Estes Park,CO,USA, 2008. 113-122. |
[15] | 李风华, 王巍, 马建峰 ,等. 协作信息系统的访问控制模型及其应用[J]. 通信学报, 2008,29(9): 116-123. LI F H , WANG W , MA J F . Access control model and its application for collaborative information systems[J]. Journal on Communications, 2008,29(9): 116-123. |
[16] | 李风华, 王巍, 马建峰 ,等. 基于行为的访问控制模型及其行为管理[J]. 电子学报, 2008,36(10): 1881-1890. LI F H , WANG W , MA J F ,et al. Action-based access control model and administration of actions[J]. Acta Electronica Sinica, 2008,36(10): 1881-1890. |
[17] | PREDA S , CUPPENS F,CUPPENS-BOULAHIA N ,et al. Dynamic deployment of context-aware access control policies for constrained security devices[J]. Journal of Systems and Software, 2011,84(7): 1144-1159. |
[18] | WANG Q , JIN H , LI N . Usable access control in collaborative environments:authorization based on people-tagging[A]. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS’09)[C]. Saint Malo,France, 2009. 268-284. |
[19] | TOLONE W , AHN G J , PAI T ,et al. Access control in collaborative systems[J]. ACM Computing Surveys (CSUR), 2005,37(1): 29-41. |
[20] | LI Q , ZHANG X , XU M ,et al. Towards secure dynamic collaborations with group-based RBAC model[J]. Computers & Security, 2009,28(5): 260-275. |
[21] | KRISHNAN R , NIU J , SANDHU R ,et al. Group-centric secure information-sharing models for isolated groups[J]. ACM Transactions on Information and System Security (TISSEC), 2011,14(3): 1-29. |
[22] | WANG Q , JIN H . Data leakage mitigation for discretionary access control in collaboration clouds[A]. Proceeding of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT’11)[C]. Innsbruck,Austria, 2011. 103-112. |
[23] | 胡春华, 陈晓红, 吴敏 ,等. 云计算中基于SLA的服务可信协商与访问控制策略[J]. 中国科学:信息科学. 2012,42(3): 314-332. HU C H , CHEN X H , WU M ,et al. A service trust negotiation and access control strategy based on SLA in cloud computin[J]. China Science:Information Science, 2012,42(3): 314-332. |
[24] | 刘武, 段海新, 张洪 ,等. TRBAC:基于信任的访问控制模型[J]. 计算机研究与发展, 2011,48(8): 1414-1420. LIU W , DUAN H X , ZHANG H ,et al. TRBAC:trust based access control model[J]. Journal of Computer Research and Development, 2011,48(8): 1414-1420. |
[25] | BHATTI R , GHAFOOR A , BERTINO E ,et al. X-GTRBAC:an XML-based policy specification framework and architecture enterprise-wide access control[J]. ACM Transactions on Informatio nd System Security (TISSEC), 2005,8(2): 187-227. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG. HDFS-oriented cryptographic key resource control mechanism [J]. Journal on Communications, 2022, 43(9): 27-41. |
[6] | Wenjun XU, Silei WU, Fengyu WANG, Lan LIN, Guojun LI, Zhi ZHANG. Large-scale post-disaster user distributed coverage optimization based on multi-agent reinforcement learning [J]. Journal on Communications, 2022, 43(8): 1-16. |
[7] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[8] | Ruyun ZHANG, Geyang XIAO, Qihe SHAN, Tao ZOU, Dan LI, Fei TENG. Communication topology reconstruction method for multi-agent cooperative control in polymorphic networks [J]. Journal on Communications, 2022, 43(4): 50-59. |
[9] | Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. |
[10] | Zan LI, Junfan HU, Bing LI, Jia SHI, Jiangbo SI. Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication [J]. Journal on Communications, 2021, 42(8): 25-32. |
[11] | Jiangtao DONG, Peiwen YAN, Ruizhong DU. Verifiable access control scheme based on unpaired CP-ABE in fog computing [J]. Journal on Communications, 2021, 42(8): 139-150. |
[12] | Junfeng TIAN, Juntao ZHANG, Yanbiao WANG. Distributed storage causal consistency model with trusted constraint [J]. Journal on Communications, 2021, 42(6): 145-157. |
[13] | Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU. Attribute-based revocable collaborative access control scheme [J]. Journal on Communications, 2021, 42(5): 75-86. |
[14] | Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU. Blockchain-based distributed EHR fine-grained traceability scheme [J]. Journal on Communications, 2021, 42(5): 205-215. |
[15] | Ruizhong DU, Peiwen YAN, Yan LIU. Fine-grained attribute update and outsourcing computing access control scheme in fog computing [J]. Journal on Communications, 2021, 42(3): 160-170. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|