Font Size: a A A

Research And System Implementation Of Access Control Model Based On Trust And Risk

Posted on:2015-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:B L YuanFull Text:PDF
GTID:2308330482957024Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, information technology affects people’s lives in various aspects. At the same time, information security has become an important issue restricts its development. How to ensure to provide quality services to legitimate users on demand, and also can prevent the illegal user’s access or legitimate users’ illegal access has become one of important issue in the field of information security. This is the problem of access control research; therefore, the design of a safe and reasonable access control model for information security has important theoretical and practical significance.By researching the technology of role based access control, combined with related technologies of trust management and risk management, the traditional access control model is improved, and the thesis proposes access control model based on trust and risk control. By two elements of trust and risk control access, enhanced security access control model as a whole. The main research content of the thesis is as follows:(1) In view of the role based access control model, roles and permissions static allocation problems in combining with the related technologies of trust and risk, puts forward the access control model based on trust and risk.(2)Beth algorithm and J(?)sang Algorithm which are used to calculate trust value are both too subjective and lack dynamic defect, this thesis proposes a dynamic adaptive calculation method, and the performance of the punishment factor, service level factor and dynamic adaptive algorithm is verified by simulation experiment.(3) The thesis researches the current relevant measure of the risk, analyses the factors that influence the risk, and constructs the risk calculation model based on BP neural network, and the accuracy of the calculated risk value by the BP neural network is verified.The results of simulation and system operation verified that the validity and efficiency of the hybrid algorithm, and showed that the research has a certain practical value.
Keywords/Search Tags:Role Based Access Control, Trust, Risk, Risk Control, BP Neural Network
PDF Full Text Request
Related items