首页> 外文会议>IEEE International Conference on Mobile Cloud Computing, Services, and Engineering >Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control
【24h】

Integrating Trust Profiles, Trust Negotiation, and Attribute Based Access Control

机译:集成信任配置文件,信任协商和基于属性的访问控制

获取原文

摘要

Access to sensitive information is traditionally achieved through an authentication and authorization process via a username/password combination to validate a user's identity that is stored within the system being accessed. This method creates delays before sensitive information can be obtained in the circumstance that the user's identity is previously unknown, due to necessary human intervention during the pre-registration process. To expedite the retrieval of sensitive information in time-critical situations, we propose a new model of trust negotiation that defines a new trust profile that contains a collection of credentials describing the user's access history. The new model of trust negotiation utilizes role-based and attribute-based access control as part of the new trust profile to model the sensitivity of information that is being requested, where access is governed by role and credentials captured in attributes. As a result of our work, an authorization system based on trust negotiation can examine the user's history in detail, decide whether to authorize the user, and add its own record of user access to the user's trust profile that can be utilized in future attempts at access at other locations.
机译:传统上,对敏感信息的访问是通过用户名/密码组合的验证和授权过程来实现的,以验证存储在要访问的系统中的用户身份。由于在预注册过程中需要人工干预,因此在以前未知用户身份的情况下,此方法会延迟获取敏感信息的时间。为了加快在时间紧迫的情况下敏感信息的检索,我们提出了一种新的信任协商模型,该模型定义了一个新的信任配置文件,其中包含描述用户访问历史的凭据集合。新的信任协商模型将基于角色和基于属性的访问控制用作新信任配置文件的一部分,以对请求信息的敏感性进行建模,其中访问由角色和属性中捕获的凭据控制。作为我们工作的结果,基于信任协商的授权系统可以详细检查用户的历史记录,决定是否对用户进行授权,并将其自己的用户访问记录添加到用户的信任配置文件中,以供将来进行尝试时使用。在其他位置访问。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号