CHEN Bo, ZENG Guosun, LI Li. Subjective Trust Control in Attribute Based Delegation Authorization Logical System[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1080-1083.
Citation: CHEN Bo, ZENG Guosun, LI Li. Subjective Trust Control in Attribute Based Delegation Authorization Logical System[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1080-1083.

Subjective Trust Control in Attribute Based Delegation Authorization Logical System

Funds: 国家863计划资助项目(2007AA01Z425);国家973计划资助项目(2007CB316502);国家自然科学基金资助项目(90718015,60673157)
More Information
  • Received Date: August 27, 2008
  • Revised Date: August 27, 2008
  • Published Date: October 04, 2008
  • Binary trust-based delegation authorization mechanism is regarded as a primary method for computational resource access in open dynamic environment.An important problem is how to apply implant a more grain trust control on delegation and authorization combined with subjective trust evaluation.This problem is probed and a subjective trust evaluation is introduced instead of binary trust evaluation.A trusted role based logical system on the semantic of attribution authorization model is proposed.The concepts of trusted role and trust constraint are proposed.The trust control policies for delegation based role trust evaluation and the trust control rules for authorization based on entity trust evaluation are put forward.The computational method for entity trust degree decrease in delegation policies is built up.The policies and rules are expressed in logic syntax and the semantic of delegation authorization logic program is given.Finally,the subjective trust control on delegation and authorization is implemented in logic semantic of attribute based delegation and authorization mechanism.
  • Related Articles

    [1]HUANG Ningyu, ZHANG Xing. Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 599-602.
    [2]LIU Lizhao, WEI Peng, WANG Ying, LI Maoqing. Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 587-590.
    [3]DU Ruizhong, YANG Xiaohui, TIAN Junfeng. A Trust Evaluation Model Based on Multiple Services Attributes[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 524-527.
    [4]SHI Wenchang. Design of Trust Base in Operating Systems[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 505-508.
    [5]LI Jian, HE Yongzhong, XU Kaiyong. Software Download Framework Based on Trust Measurement[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1062-1066.
    [6]CHEN Wenzhi, HUANG Wei. SmartMK:TPM-based Trusted Multi-Kernel Operating System Architecture[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1034-1037.
    [7]ZHANG Xing, SHEN Changxiang. A Novel Design of Trusted Platform Control Module[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1011-1014.
    [8]ZHANG Huanguo, QIN Zhongping, LIU Yi, HAN Yongqiao. A New Type Trusted Platform Module(TPM)[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 991-994.
    [9]ZHAO Bo, LIU Shubo, TANG Ming, ZHANG Huanguo. Implementation of Trusted Computing in CommercialCryptogram Based on Hardware[J]. Geomatics and Information Science of Wuhan University, 2004, 29(11): 1030-1033.
    [10]ZHU Xia, SUN Zhenbing. Role-based Geographic Entities' Authorized Granularity Control in GIS[J]. Geomatics and Information Science of Wuhan University, 2004, 29(2): 157-160,183.

Catalog

    Article views (943) PDF downloads (131) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return