Abstract
In order to solve the current situation that the trust computation of access control model based on trust is insufficient to conduct a fine-grained and dynamic access control, the access control (role model RACT access control model based on trust) which is a fine-grained and integrated with the context is built. The trust value and the threshold of activation and decision tree algorithm are added into RACT to improve the single trust value algorithm for multiple algorithms and realize dynamic access control which is combined with the session history. Experiments show that RACT has higher security than the existing trust model.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bleckmann DM, Starnes WW, Andersen BD. Method to control access between network endpoints based on trust scores calculated from information system component analysis: U.S. Patent 8,429,412. 2013-4-23.
Li Q, Zhang X, Xu M, et al. Towards secure dynamic collaborations with group-based RBAC model. Comput Security. 2009;28(5):260–75.
Duan J, Gao D, Foh CH, et al. TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw. 2013;11(8):2675–92.
Le XH, Doll T, Barbosu M, et al. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J Biomed Inform. 2012;45(6):1084–107.
Ma X, Li R, Lu Z, et al. Mining constraints in role-based access control. Math Comput Model. 2012;55(1):87–96.
Zhong R, Sumalee A, Maruyama T. Dynamic marginal cost, access control, and pollution charge: a comparison of bottleneck and whole link models. J Adv Transp. 2012;46(3):191–221.
Joshi JB, Bertino E, Latif U, et al. A generalized temporal role-based access control model. Knowl Eng IEEE Trans. 2005;17(1):4–23.
Goyal V, Pandey O, Sahai A et al. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006: 89–98.
Roesner F, Kohno T, Moshchuk A et al. User-driven access control: rethinking permission granting in modern operating systems. Security and Privacy (SP), 2012 I.E. Symposium on. IEEE, 2012: 224–238.
Park J, Sandhu R, Cheng Y. A user-activity-centric framework for access control in online social networks. Internet Comput IEEE. 2011;15(5):62–5.
Ferraiolo DF, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control. ACM Trans Inform Syst Security (TISSEC). 2001;4(3):224–74.
Acknowledgments
As the research of the thesis is sponsored by National Natural Science Foundation of China (No: 61262075) and major scientific research project of Guangxi Higher Education (No: 201201ZD012), we would like to extend our sincere gratitude to them.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Cheng, X., Wang, T. (2015). Trust Value of the Role Access Control Model Based on Trust. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-11104-9_21
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11103-2
Online ISBN: 978-3-319-11104-9
eBook Packages: EngineeringEngineering (R0)