DocumentCode :
493102
Title :
An Access Control Model for Trustworthy Network
Author :
Feng, Fujun ; Lin, Chuang ; Li, Junshan
Author_Institution :
Dept. of Comput., Second Artillery Eng. Coll., Xi´´an
Volume :
1
fYear :
2009
fDate :
25-26 April 2009
Firstpage :
308
Lastpage :
311
Abstract :
Trustworthy network is the inevitable trend in the development of high trusted computing and Internet. It is beyond the traditional information security including confidentiality, integrity and availability, but on the survivability and controllability. Trustworthiness of users on identity and behaviors is very important for trustworthy network, which can be realized by access control technology. Firstly, we discuss the security requirements of access control in trustworthy network. Then we propose a Trust and Context based Access Control (TCAC) model, and describe the core, hierarchical and constrained TCAC in detail. Finally, a trust evaluation mechanism is presented.
Keywords :
Internet; authorisation; Internet; high trusted computing; information security; trust and context based access control model; trust evaluation mechanism; trustworthy network; Access control; Availability; Computer architecture; Computer networks; Computer security; Context modeling; Controllability; IP networks; Information security; Quality of service; access control; trust; trustworthy network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
Type :
conf
DOI :
10.1109/NSWCTC.2009.405
Filename :
4908271
Link To Document :
بازگشت