Font Size: a A A

Design And Implementation Of A Trust Management System For Access Control

Posted on:2013-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:F Y ShiFull Text:PDF
GTID:2248330371966320Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Access control as an important protecting mean of information security is widely studied all the time. During the years while it developed, there were many mature models, and some have been used in personal computer and enterprise environment, such as DAC, MAC, RABC etc. These identity-based access control model have a problem that the policy could not be dynamically adjusted according to visitors’ behavior. Reputation-based trust management model is able to assist access control system to solve this problem. It has proposed an idea of behavior-based trust evaluation, and the trust can be defined as a result which can be dynamically changed according to behavior.This paper presents a viable scheme about applying reputation-based trust management theory to access control system, and presents that regard the terminal’s security as an important component of assessing trust, after sufficiently researching the factors which may affect the trust between subjects. This enriches the reputation-based trust management theory about the content of the trust evaluation, at the same time assess from a more comprehensive perspective can make the result more accurate. Terminal’s security consists of vulnerability, intrusion attack and virus information, and the more dangerous the security issue is, the greater impact it does to the trust. Based on the analysis above, this paper designs and realizes a trust management system independent of access control system, and gives the basic deployment scenario, finally tests all the functions of the trust management system, including simulate different types and dangerous levels of security incidents to test the impact to the trust value. The result shows that the more dangerous the security issue is, the greater impact it does to the trust, which achieves the desired requirement.
Keywords/Search Tags:trust management, trust value, access control
PDF Full Text Request
Related items