预览加载中,请您耐心等待几秒...
1/3
2/3
3/3

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

开放式环境下一种基于信任度的RBAC模型 Abstract Withthedevelopmentofinformationtechnologyandthegrowingpopularityofcommunicationnetworks,securitymanagementandcontrolhavebecomeimportantissuesinopenenvironments.Therole-basedaccesscontrol(RBAC)modelhasbeenwidelyusedinsecuritymanagementsystems,butithassomelimitationsinopenenvironments.Toaddresstheselimitations,atrust-basedRBACmodelisproposedinthispaper.Thismodelconsidersthetrustworthinessofusersandresourcesintheopenenvironment,whichimprovesthesecurityoftheaccesscontrolsystemandenhancesthetrustrelationshipsofusers. Introduction Accesscontrolisanimportantaspectofinformationsecurity,especiallyinopenenvironments,whereunauthorizedaccesscanleadtodatabreachesandothersecurityincidents.Therole-basedaccesscontrol(RBAC)modelhasbeenwidelyusedinsecuritymanagementsystemsbecauseitprovidesaflexibleandscalablewaytomanageaccesspermissions.However,thetraditionalRBACmodellackstheabilitytoconsidertrustrelationshipsbetweenusersandresourcesinopenenvironments,whichmakesitvulnerabletoattackssuchasinsiderattacksandprivilegeescalationattacks. Toaddresstheseissues,atrust-basedRBACmodelisproposedinthispaper.Thismodelconsidersthetrustworthinessofusersandresourcesintheopenenvironment,whichimprovesthesecurityoftheaccesscontrolsystemandenhancesthetrustrelationshipsofusers. RelatedWork ThetraditionalRBACmodelisbasedontheconceptofroles,wheredifferentrolesareassigneddifferentlevelsofpermissions.Thismodeliswidelyusedinlarge-scalesystems,suchastheNationalInstituteofStandardsandTechnology(NIST)RBACmodel.However,thetraditionalRBACmodelisnotsuitableforopenenvironmentsbecauseitdoesnotconsiderthetrustrelationshipsbetweenusersandresources. Anumberoftrust-basedaccesscontrolmodelshavebeenproposedtoaddressthisissue.Forexample,thetrustRBACmodelproposedbyLietal.[1]usesareputationscoretoevaluatethetrustworthinessofusersandresources.ThemodelproposedbyHuetal.[2]usesafuzzylogicapproachtocalculatetrustscoresbasedonusers'behavior.However,thesemodelshavelimitationsintermsofscalability,complexi