没有合适的资源?快使用搜索试试~ 我知道了~
首页开放网络访问控制:推荐信任评估方法
开放网络访问控制:推荐信任评估方法
0 下载量 140 浏览量
更新于2024-08-26
收藏 705KB PDF 举报
"评估开放网络中访问控制的推荐信任" 在开放网络环境下,访问控制是保护信息安全的关键技术。传统的访问控制机制可能不足以应对开放网络的复杂性和动态性,因此,基于信任的访问控制逐渐受到重视。信任评估在这个过程中起到了决定性的作用,尤其是在实体间互动不足的情况下,直接信任的可靠性可能会下降。此时,推荐信任成为评估访问控制的重要工具。 推荐信任是指在没有或很少直接交互的情况下,实体依赖于其他实体的推荐来形成对某个对象的信任程度。在开放网络中,由于网络的匿名性和动态性,直接交互可能受限,因此推荐信任成为了建立信任关系的关键途径。本文提出了一种推荐信任度的评估方法,旨在解决在专家调查、模糊分析和灰色关联分析中的决策属性权重分配问题。 专家调查是获取专业知识和经验的有效方式,可以为评估提供有价值的输入。模糊分析则允许处理不精确或不确定的信息,这对于开放网络环境中常见的模糊信任情况非常适用。灰色关联分析则用于衡量不同因素之间的相似性或关联性,帮助确定哪些因素对信任度影响最大。 该方法通过结合这三种理论,能够更全面地考虑各种因素,从而更准确地评估推荐信任。实验结果验证了该方法的有效性,并显示其相比其他同类方法具有优势。实验表明,提出的评估方法能够与实际情境下的信任度匹配,从而为开放网络中的访问控制决策提供有力支持。 这篇研究论文为开放网络环境中的访问控制提供了一个新的视角,通过推荐信任的评估,提升了决策的准确性和安全性。这种方法的应用有助于在网络环境中更好地管理和控制访问权限,从而增强整体的信息安全。此外,它也为未来的研究提供了新的思路,即如何在不完全信息和复杂网络环境中构建和评估信任模型。
资源详情
资源推荐
Cluster Comput
https://doi.org/10.1007/s10586-017-1338-x
Assessment of recommendation trust for access control in open
networks
Bin Zhao
1,2
· Chuangbai Xiao
1
· Yu Zhang
1
· Peng Zhai
1
· Zhi Wang
3
Received: 9 August 2017 / Revised: 21 October 2017 / Accepted: 4 November 2017
© Springer Science+Business Media, LLC, part of Springer Nature 2018
Abstract Access control is an important means of ensur-
ing information security, and trust-based access control has
been considered as an effective mechanism for access con-
trol in open networks. To make access control mechanisms
more effective, the assessment of trust has become a key
issue. Among the different components of trust, recommen-
dation trust plays a key role in environments and applications
in which there are not enough direct interactions between
entities, making direct trust l ess reliable. In this paper, we
propose a method for the assessment of recommendation trust
in which we try to solve the problem of weight assignment to
decision attributes by using relevant theories in expert inves-
tigation, fuzzy analysis and gray correlation analysis. We
also perform some experiment to show that the r esults of the
proposed assessment method are in line with the actual ones
to demonstrate the effectiveness of the proposed method as
well as its advantages over some other comparable methods.
Keywords Open networks · Access control · Trust
assessment · Recommendation
B
Zhi Wang
zwang@nankai.edu.cn
Bin Zhao
pp71515855leiyou@163.com
1
College of Computer Science, Beijing University of
Technology, Beijing, China
2
Department of Computer Science, Jining University, Qufu,
Shandong, China
3
College of Computer and Control Engineering, Nankai
University, Tianjin, China
1 Introduction
Access control is one of the important security means for
the protection of information and system resources. In the
development of the access control model and mechanism,
the trust based access control has become the hot spot of the
current open network research. Trust is one of the most com-
plicated human social relationships with the characteristics of
subjectiveness, uncertainty and ambiguity. Different entities
may have different criteria on trust evaluation. Thus, trust and
distrust are relative, particularly in unclear and unstable stage
of trust relationships. For example, if A has more trust on B,
then B can take up more proportion of the decision-making
for A. Trust assessment, quantification and management are
very difficult because trust is affected by a variety of factors
such as time and space [1].
In access control mechanisms, there are three basic ele-
ments: the subject, the object and the access permissions.
Trust assessment can be the basis for the object to determine
and assign access permissions to the subject. Most study on
trust assessment takes advantage of characteristics of human
relationships in the real world in which the evaluation con-
siders multi-dimensional properties of trust so as to more
precisely describe the complexity of trust to ensure that trust
assessment results are applicable to access control. Between
the two main components of trust, i.e., direct trust and rec-
ommendation trust, the latter may play a more important role
in environments and applications in which direct interactions
between entities are sparse, making direct trust less reliable.
This is especially true in big data and in applications where
there are many options for the user to access data and system
resources. For trust-based access control in open networks,
we focus on the assessment of recommendation trust in this
paper and propose a method for the assessment of recommen-
dation trust that focuses on weight assignment to different
123
下载后可阅读完整内容,剩余6页未读,立即下载
weixin_38711369
- 粉丝: 10
- 资源: 978
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 十种常见电感线圈电感量计算公式详解
- 军用车辆:CAN总线的集成与优势
- CAN总线在汽车智能换档系统中的作用与实现
- CAN总线数据超载问题及解决策略
- 汽车车身系统CAN总线设计与应用
- SAP企业需求深度剖析:财务会计与供应链的关键流程与改进策略
- CAN总线在发动机电控系统中的通信设计实践
- Spring与iBATIS整合:快速开发与比较分析
- CAN总线驱动的整车管理系统硬件设计详解
- CAN总线通讯智能节点设计与实现
- DSP实现电动汽车CAN总线通讯技术
- CAN协议网关设计:自动位速率检测与互连
- Xcode免证书调试iPad程序开发指南
- 分布式数据库查询优化算法探讨
- Win7安装VC++6.0完全指南:解决兼容性与Office冲突
- MFC实现学生信息管理系统:登录与数据库操作
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功