Font Size: a A A

The Algorithm Based On Fuzzy Strategy To Support The Multi-access Control Model And Its Application

Posted on:2011-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:J XiongFull Text:PDF
GTID:2178360308969394Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Most of current access control models, such as MAC, RBAC and TBAC, are single stragety access model. These models are made from different aspects, and can be used and restricted in different scopes. In applications, to achieve better security, strategies from multiple models should be organized to surpport flexible stragety.Available access control models are first analyzed, including DAC, MAC,RBAC and TBAC. All these models are categorized as traditional, integrated and stragety based access model. The security stragety model and the importance in access control are also discussed.A multi-stragety access control model is proposed, and operator based stragety regulation and XML based stragety description is also given. For better describe strageties, they are categorized. Adding, editing and canceling stragety is also discussed. For stragety selection and decision, through fuzzilization and analysis of role, popedom and security stragety, fuzzy algorithm is introduced for judging of user popedom. As the analysis reveals, this model can support multiple stragety coordination of current models.At last, combing with the realistic need of digital library, multiple stragety based access control is used. The overall desgin, main block design and database design are proposed.
Keywords/Search Tags:Fuzzy Algorithm, Negative Feedback, Security Strategy, Access Control
PDF Full Text Request
Related items