DocumentCode
3285202
Title
Trust Based Authorization and Access Control
Author
Fujun, Feng ; Junshan, Li
Author_Institution
Dept. of Comput., Second Artillery Eng. Coll., Xi´´an, China
Volume
3
fYear
2009
fDate
15-17 May 2009
Firstpage
162
Lastpage
165
Abstract
Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.
Keywords
authorisation; access control; national college entrance system; trust and context based access control; trust based authorization; Access control; Application software; Authorization; Computer security; Context modeling; Information security; Information technology; Peer to peer computing; Permission; Protection; access control; authorization; rule; trust;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location
Chengdu
Print_ISBN
978-0-7695-3600-2
Type
conf
DOI
10.1109/IFITA.2009.240
Filename
5232085
Link To Document