Font Size: a A A

Design And Implementation Of Role-Based Access Control System Based On Trust

Posted on:2017-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:W YangFull Text:PDF
GTID:2428330566453108Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of social economy and the Internet technology,in order to adapt to the "Internet plus" ideas,various institutions and enterprises have established their own information platform.With information technology industry bringing people great convenience,information security causes more and more people's attention.In particular,with the changing of information security risks of computer viruses and hacker attacks,the problem of information security is becoming increasingly serious,to ensure the safety and reliability of information technology platform has become the focus of the current research.Access Control Service is one of the key technologies of information security,and it is the information security technology used by most information system at present.Role based access control is introduced into the role elements,users obtain resource permissions indirectly through the role,simplify the authorization management,which makes the role of access control can be applied to complex and diverse environments.Based on the actual needs of the road network operation monitoring and emergency response systems,on the basis of studying the theory of role access control and trusted computing,aiming at the existing problems,design and implement the role of access control system based on credibility.The main research work is as follows:1)Study the role access control and current development status of trusted computing,in view of the problems existing in the traditional role access control technology,the trusted computing and the role access control are combined,the role of access control based on credibility is proposed.2)In view of the traditional role of access control model to the complex defects of a large number of users with the same authority,join the user group functions,by authorizing the user group indirectly to achieve the unified authorization of a large number of users,which simplifies the authorization management.According to the traditional role of access control authorization time permanent,this paper join the role of the time and space constraints,enhance the role of access control security,and access to the user join the data level control,more fine-grained access control is realized.3)In view of the traditional role of access control model is a static authorization,without considering the influence of user behavior on the system,this paper combines the idea of trusted computing,calculates user credibility based on user behavior,and adjusts user permissions dynamically based on user credibility.Evaluation of two aspects of user credibility from the system environmental credibility and user behavior credibility,AHP is used to calculate for system environmental credibility,J?sang trust model is used to calculate for the user behavior credibility,and penalty factor is added in J?sang trust model,which makes the user credibility evaluation more flexible.4)In view of the project construction goal and the function demand,combined with the actual situation of the project,the detailed design and implementation of the system is given,including design and implementation of the main function modules and databases.5)Based on the design and implementation of the system,the system test scheme is given,and the system is tested according to the test plan.which proved effectiveness,feasibility of the system design and implementation scheme.
Keywords/Search Tags:access control, trusted computing, role, user credibility, authentication
PDF Full Text Request
Related items