Title :
Research on key-based trust model
Author :
Jianjun Wang ; Jianping Li ; Chongming Ma ; Jing Peng
Author_Institution :
Sch. of Comput. Sci., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Abstract :
In the distributed environments, Anonymous Access and Delegation are not satisfied in the traditional Access Control. However, they can be guaranteed in the Key-based Trust Models, because a key represents the identification of one user, both authorization and key are associated with each other. In the Key-based Trust Models, the most representative ones are PolicyMaker, SPKI/SDSI and QCM. In this paper, we extract the mechanisms of authorization from these models, discuss the advantages and disadvantages, so as to develop new studies and applications.
Keywords :
authorisation; trusted computing; PolicyMaker; QCM; SPKI-SDSI; access control; anonymous access and delegation; distributed environments; key-based trust model; user identification; Authorization; Computational modeling; Engines; Public key; Reliability; Key; anonymous access; authorization delegation; trust model;
Conference_Titel :
Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2013 10th International Computer Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-2445-5
DOI :
10.1109/ICCWAMTIP.2013.6716621