Font Size: a A A

Research On Trustworthiness-Based RBAC Model And Its Application

Posted on:2009-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:W ChenFull Text:PDF
GTID:2178360242996115Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Nowadays, with the development of network, the problem of information security is emphasized more and more. As tow important security technologies in the area of information security, authentication and access control have played an important role in network information systems. However, in traditional security plans, there exists a key problem that these two mechanisms have little relationship with each other. This causes the authentication and the authorization disjointed and thus brings potential safety threats.To solve this problem, this issue raises the RBAC model based-on trustworthiness. This model combines access control with trustworthiness technology, using the trustworthiness value to measure the result of authentication. In this way, the relationship between authentication and access control has been strengthened. The model and the application of RBAC based-on trustworthiness are researched in this paper. The main task includes: (1) the RBAC model based-on trustworthiness and its features; (2) trustworthiness value and its calculation; (3) the object access condition base-on trustworthiness; (4) the application of the trustworthiness-based RBAC model in the teaching administration system.The object access condition base-on trustworthiness is stressed in this paper. The users get different trustworthiness values according to the intensity of the authentication rules which they have passed. Then the trustworthiness value will become the decision basis for the system granting different authorities to the user. Applying this object access condition to RBAC access model, the users cannot get their deserved authorities unless they have satisfied the two levels trust access constraints for roles and permissions. Because the result of authentication is considered in the process of authorization, this model favorably reaches the goal of relating the authentication process and access control.At the background of the research and development of the teaching administration system for our school, the overall structure of the security sub-system is proposed. Applying the trustworthiness-based RBAC model to the security sub-system, the flow process of authentication and access control is programmed. And the function of the security components and the design for database are also detailed discussed.
Keywords/Search Tags:access control, RBAC, authentication, trustworthiness, trust activate
PDF Full Text Request
Related items