山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (3): 86-90.doi: 10.6040/j.issn.1671-9352.2.2015.120
赵斌1,2,3,何泾沙1,张伊璇1
ZHAO Bin1,2,3, HE Jing-sha1, ZHANG Yi-xuan1
摘要: 在开放式网络基于信任的访问控制中,信任量化与评估是授权决策的前提,决策属性权重的确立是信任量化与评估的关键的核心问题。借助专家调查法和模糊分析法提出了基于信息熵隶属度的决策属性权重确定方法,通过算例数据分析表明利用决策属性权重计算所得的结果与实际是相符的,该方法能够保证信任评估的有效性和客观性。
中图分类号:
[1] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C] //Proceedings 1996 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society, 1996:164-173. [2] BLAZE M, FEIGENBAUM J, KEROMYTIS A D. KeyNote: turst management for public-key infrastructures[C] //Proceedings of Cambridge 1998 Security Protocols Internatioonal Workshop. Berlin: Springer-Verglag, 1999:59-63. [3] LI NH, MITCHELL JC, WINSBOROUGH WH. Design of a role-based trust management framework [C] //Proceedings of Conference 2002 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2002:114-130. [4] PHOOMVUTHISSARN S. Trust and role based access control for secure interoperation [C] //Proceedings of Conference International Symposium on Communication and Information Technology. New York: IEEE, 2007, 1458-1463. [5] DIMMOCK N, BELOKOSZTOLSZKI A, EYERS D, et al. Using trust and risk in role-based access control policies[C] //Proceedings of Conference 9th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2004: 156-162. [6] LI Ruixuan, TANG Zhuo, LU Zhengding, et al. Request-driven role mapping framework for secure interoperation in multi-domain environment [J]. Computer Systems Science and Engineering, 2008, 23(3):193-207. [7] SARROUH N. Formal modeling of trust-based access control in dynamic coalitions[C] //Proceedings of Conference IEEE 37th Annual Computer Software and Applications Conference(COMPSAC). New York: IEEE, 2013: 224-229. [8] ZHANG Yixuan, HE Jingsha, ZHAO Bin, et al. Towards more pro-active access control in computer systems and networks[J]. Computers & Security, 2015, 49: 132-146. [9] 李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,01:163-176. LI Xiaoyong, GUI Xiaolin. Cognitive model of dynamic trust forecasting[J]. Journal of Software, 2010, 01:163-176. [10] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5):942-952. [11] 刘宴兵, 龚雪红, 冯艳芬. 基于物联网节点行为检测的信任评估方法[J].通信学报, 2014, 35(5):8-15. LIU Yanbing, GONG Xuehong, FENG Yanfen. Trust evaluation method based on the node behavior detection of the Internet of things[J]. Journal of Communication, 2014, 35(5): 8-15. [12] 张仕斌, 许春香. 基于云模型的信任评估方法研究[J]. 计算机学报, 2013, 36(2): 422-431. ZHANG Shibin, XU Chunxiang. Research on trust evaluation method based on cloud model[J]. Journal of Computer Science, 2013, 36(2):422-431. [13] TRIVELLATO D, ZANNONE N, ETALLE S. A distributed goal evaluation algorithm for trust management[J]. Theory and Practice of Logic Programming, 2014, 14:293-337. [14] SMARI W W, CLEMENTE P, LALANDE JF. An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system[J]. Future Generation ComputeR Systems-the International Journal of Grid Computing and Escience, 2014, 31:147-168. [15] LI Min, SUN Xiaoxun, WANG Hua. Multi-level delegations with trust management in access control systems[J]. Journal of Intelligent Information Systems, 2012, 39(3):611-626. |
[1] | 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91. |
[2] | 蔡红云,马晓雪. 在线社会网络中基于关系强度的访问控制机制[J]. 山东大学学报(理学版), 2016, 51(7): 90-97. |
[3] | 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106. |
[4] | 翟鹏,李登道. 基于高斯隶属度的包容性指标模糊聚类算法[J]. 山东大学学报(理学版), 2016, 51(5): 102-105. |
[5] | 蒋伟进, 许宇晖, 郭宏, 许宇胜. 基于多智能体的多维证据动态信任计算模型[J]. 山东大学学报(理学版), 2015, 50(01): 1-11. |
[6] | 吕盟, 刘哲, 刘建伟. 企业级无线局域网可信域间访问控制方案[J]. 山东大学学报(理学版), 2014, 49(11): 82-88. |
[7] | 杨晓晖, 王虹, 江丽军, 常思远. 一种基于信任度量的Web服务跨域访问控制模型[J]. 山东大学学报(理学版), 2014, 49(09): 115-122. |
[8] | 邹德清, 杨凯, 张晓旭, 苑博阳, 冯明路. 虚拟域内访问控制系统的保护机制研究[J]. 山东大学学报(理学版), 2014, 49(09): 135-141. |
[9] | 罗海燕, 吕萍, 刘林忠, 杨洵. 云环境下基于模糊粗糙AHP的企业信任综合评估[J]. 山东大学学报(理学版), 2014, 49(08): 111-117. |
[10] | 史存会,林鸿飞*. 追踪事件微博报道:一种流的动态话题模型[J]. J4, 2012, 47(5): 13-18. |
[11] | 曹林林1,2,张化祥1,2*,王至超1,2. 一种基于信息熵数据修剪的支持向量机:EB-SVM[J]. J4, 2012, 47(5): 59-62. |
[12] | 高枫1,何泾沙2. 基于信任和信息流模型的隐私保护方法[J]. J4, 2011, 46(5): 39-43. |
[13] | 刘琚,郑丽娜. 多跳无线网络中协作ARQ机制和协作MAC技术[J]. J4, 2011, 46(10): 57-65. |
[14] | 叶明全1,2, 胡学钢1,伍长荣3. 垂直划分多决策表下基于条件信息熵的隐私保护属性约简[J]. J4, 2010, 45(9): 14-19. |
[15] | 陈 钦,冯建华 . 一个企业级多媒体数据库的设计与实现[J]. J4, 2007, 42(9): 46-50 . |
|