Title :
Trust Based Authorization and Access Control
Author :
Fujun, Feng ; Junshan, Li
Author_Institution :
Dept. of Comput., Second Artillery Eng. Coll., Xi´´an, China
Abstract :
Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.
Keywords :
authorisation; access control; national college entrance system; trust and context based access control; trust based authorization; Access control; Application software; Authorization; Computer security; Context modeling; Information security; Information technology; Peer to peer computing; Permission; Protection; access control; authorization; rule; trust;
Conference_Titel :
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3600-2
DOI :
10.1109/IFITA.2009.240