会议专题

Design and Implementation of Trust-based Access Control System for Cloud Computing

  Reasonable authorization and access control is one of the urgent problems that cloud computing applications need to solve,especially in the context of dynamic establishment of trust relationship between entities to study the open access security environment.This paper proposes a generation method of cross-domain access control strategy from trust evaluation to trust management.Based on the trust generation method of cross-domain access control policy,a trust-based access control system of cloud computing is designed and implemented.The system is mainly divided into four functional modules: credit evaluation module,trust relationship data mining module,trust management strategy generation module and access strategy implementation module.The main process,design and implementation method of the corresponding method are expounded.The access control file is verified,and the expected access control results are obtained.

access control reputation assessment trust management XACML

Hui Xia

Software College,Shenyang Normal university Shenyang,China

国际会议

2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference(ITOEC2017)(2017 IEEE 第3届信息技术与机电一体化工程国际学术会议)

重庆

英文

922-926

2017-10-03(万方平台首次上网日期,不代表论文的发表时间)