International Journal of Computational Intelligence Systems

Volume 5, Issue 5, September 2012, Pages 942 - 952

An Access Control Method based on Scenario Trust

Authors
Shunan Ma, Jingsha He, Xunbo Shuai
Corresponding Author
Shunan Ma
Received 30 November 2011, Accepted 19 June 2012, Available Online 1 September 2012.
DOI
10.1080/18756891.2012.733233How to use a DOI?
Keywords
access control, scenario trust, permission, fuzzy clustering
Abstract

Access control is an important element in network security. Meanwhile, trust provides a new direction for access control in open network environments. Based on the dynamic nature of trust, we study the temporal and spatial characteristics in the security of society and propose the concept of scenario trust in which we consider four factors: access time, place, history behavior and risk control strategy. First, we apply fuzzy clustering method and information entropy theory to the design of an algorithm for allocating weights to the factors of scenario trust and, consequently, quantify scenario trust. Then, we introduce the notion of trust threshold for fine-grained access permission management and describe the rules that map scenario trust values to access permissions. On this basis, we propose a dynamic access control model based on scenario trust. Simulation results show that the proposed method is effective and can defend joint fraud. The model exhibits good scalability and can meet the need of dynamic access control in open network environments.

Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Journal
International Journal of Computational Intelligence Systems
Volume-Issue
5 - 5
Pages
942 - 952
Publication Date
2012/09/01
ISSN (Online)
1875-6883
ISSN (Print)
1875-6891
DOI
10.1080/18756891.2012.733233How to use a DOI?
Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - JOUR
AU  - Shunan Ma
AU  - Jingsha He
AU  - Xunbo Shuai
PY  - 2012
DA  - 2012/09/01
TI  - An Access Control Method based on Scenario Trust
JO  - International Journal of Computational Intelligence Systems
SP  - 942
EP  - 952
VL  - 5
IS  - 5
SN  - 1875-6883
UR  - https://doi.org/10.1080/18756891.2012.733233
DO  - 10.1080/18756891.2012.733233
ID  - Ma2012
ER  -