DocumentCode :
3270011
Title :
A Security Log Based Trust Negotiation Model
Author :
Yuan, Cao ; Li, Yaqin ; Yan, Jun ; Liao, Zhengsong
Author_Institution :
Dept. of Comput. & Inf. Eng., Wuhan Polytech. Univ., Wuhan, China
Volume :
2
fYear :
2009
fDate :
6-7 June 2009
Firstpage :
517
Lastpage :
520
Abstract :
Trust negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track userspsila deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track userspsila deed by recording all kinds of negotiation states.
Keywords :
authorisation; access control policies; distributed environment; iterative credentials; open environment; resource share; security log based trust negotiation model; system administrator; Access control; Authorization; Computational intelligence; Computer security; Data security; Information security; Iterative methods; Mobile computing; Permission; Resource management; Access Control Policy; Authorization; Digital Credential; Security log; Trust Negotiation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Natural Computing, 2009. CINC '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3645-3
Type :
conf
DOI :
10.1109/CINC.2009.83
Filename :
5231290
Link To Document :
بازگشت