Font Size: a A A

The Studying Of Access Control Model Based On Authentication Trustworthiness

Posted on:2010-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q WangFull Text:PDF
GTID:2178360278480738Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the computing environment becomes more and more complex in network, there are new challenges in network security. Traditional access control technologies can allow each request by judging whether its policy is in accordance with the requirements of resources .While in nowadays,users are not fixed in a group.The system would not be possible for establish access control list.To resolve this problem,this paper presents an access control model based on authentication trustworthiness. The main contribution done as follows:Firstly, an access control model based on authentication trustworthiness is proposed.The model used authentication trustworthiness as a criteriaJn the past, the access control model and authentication are not associated. In our model,the authentication trustworthiness can be used in the access of the users. In this paper, access control model and authentication trustworthiness will be combined. Authentication trustworthiness is calculated by the rules which the users are authenticated.Secondly, the weights of the rules in the strategy library are calculated with AHP. In the model, the authenticated rules are divided into two parts:the rules which the users must be authenticated and the rules which can enforce the trustworthiness of the users. If the users'trustworthiness reach the threshold of the providers,Then the users can be authorized to visit the resources of the providers.The providers can serve the users firstly if they have more trustworthiness.Finally,this model is used in the "China Mobile Agents (MAS) Server".The uthentication trustworthiness is applied in the MAS server, it can help enterprises choose the mobile users which have high authentication trustworthiness.
Keywords/Search Tags:Open Network, Access Control Model, Authentication Trustworthiness, MAS System
PDF Full Text Request
Related items