Access Control Based on Trust Policy in Open Grid Environment
Liting Gao, Zhenyan Wang
Available Online May 2014.
- 10.2991/iccia.2012.401How to use a DOI?
- trust policy, trust constraint, blacklist, white list, grid computing
This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level. It also can establish trust policy based on assets importance and user trust level, specify the relationship between user trust and assets value and take it as a dynamic trust constraint for access control. The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Liting Gao AU - Zhenyan Wang PY - 2014/05 DA - 2014/05 TI - Access Control Based on Trust Policy in Open Grid Environment BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 1612 EP - 1615 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.401 DO - 10.2991/iccia.2012.401 ID - Gao2014/05 ER -