Font Size: a A A

In The Networked Manufacturing Environment Access Control Model Oriented To Collaborative Project Research

Posted on:2014-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2248330395483121Subject:Mechanical Manufacturing and Automation
Abstract/Summary:PDF Full Text Request
In the Networked Manufacturing environment, the production organization form has adopted life cycle project management mechanism which is focused on the production by multiple enterprises or departments. In the process of project implementation, large amounts of project data information will produce. To project personnel are concerned, they need to be authorized to access these project data in the different stages of project implementation. However, these data probably suffer from eavesdropping, tampering and damage during transmission which makes the enterprise data faced a serious security risk. Therefore, implementing technical means toward the project personnel is of great significance.Based on the problem of security problem in the process of resource sharing between muti-project domain data, we do research from the perspecitive of Trust Management and Access Control."Trust" related concept and the key technology of Access Control in the field of information security are introduced. Based on the analysis of the the design requirement of the cooperative project orient Access Control model, the overall technical framework of our model is given. Firstly, on the basis of studying the security structure model of project domain and analyzing trust negotiation mechanism in critical implementation stages of access control, A Collaborative Project Domain Control Model is presented. And also, based on the two key trust relationships, which is Recommendation Based Trust and Behaviour Based Trust, through the access control process, the CSARA (Correlation Similarity based Access Recommendation Algorithm) and the ALTMA(Access Log based Trust Mining Algorithm) are presented for each trust relationship above. In which, The CSARA is adopted to evaluate the correlation similarity between personnels from different project field, and the couples who have higher correlation similarity are recommended to each other; The ALTMA is adopted to evaluate the trust value between personnels with the method of mining the access log that is accessible in the project collaborative platform, which can support decision making of access authorization.At last, the value experiment toward the the uncertain parameters in the above two algorithms using the experimental data, furthermore, the rationality and superiority of the two algorithms are verified.
Keywords/Search Tags:Networked manufacturing, Information Security, Access Control, TrustManagement, Trust Mining
PDF Full Text Request
Related items