Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic accesses control method based on trust model

A dynamic access control and trust model technology, applied to electrical components, user identity/authority verification, transmission systems, etc., can solve the problem of difficulty in centrally maintaining certificate revocation lists, difficulty in applying to large-scale user groups, and weakening of individual self-trust, etc. question

Inactive Publication Date: 2010-02-17
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional certificate systems based on public key systems, such as X.509, PGP, etc., cannot well meet the security requirements of grid computing:
[0004] (1) The certification center only guarantees the individual identification in the general sense, and does not verify the individual's ability or grant its authority, that is, it only authenticates the user's identity, but does not know whether the user has the ability or authority to operate , which also cannot guarantee the security of the system;
[0005] (2) Relying entirely on the certification center weakens the self-trust of individuals, and blindly trusting a large-scale certification center often fails to resolve the conflict of interest between individuals;
[0006] (3) It is difficult to centrally maintain the certificate revocation list, and the certificate is likely to be abused
In addition, although the public key certificate system that relies on individuals for identity authentication and recommendation has great flexibility, without a centralized trust agent, it will be difficult to apply to a large-scale user group

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic accesses control method based on trust model
  • Dynamic accesses control method based on trust model
  • Dynamic accesses control method based on trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] 1. Grid users request access to resources

[0078] If the customer is not registered, he should first generate a local certificate to be issued locally, and then submit the certificate to the certification authority CA (Certification authority) to request authorization. The certification center judges whether the customer has permission to access grid resources. Use its private key to sign the local certificate sent from the client and return it to the user. After receiving the issued certificate, the client registers with the autonomous domain server and sends its own digital certificate. The autonomous domain server verifies the digital certificate , after passing, the customer ID and password will be saved in the autonomous domain service database, and the customer will become a grid user;

[0079] When a grid user submits a task, he first logs in to the autonomous domain server, and then single-signs on. The purpose is to prevent the user from logging in to other au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A dynamic access control method based on the trust model is a security solution of the dynamic access control, which solves the problem how the users screen out the trusty node in the gridding and meets the requirement of the user massive operations by optimized distribution of the mission submitted by users according to the ability of respective resource node. The method applies the trust model and the trust evaluation control mechanism to implement the security protection to the resource provider and resource consumer in the gridding community and provide a quality guarantee to the mission submitted. The method applies the trust model into the access control mechanism and applies trust model to solves the problem how the users screen out the resource node according with the user requirement in the gridding so as to accomplish the emission submitted by users and solve the security of cooperation and resource sharing between the gridding user and gridding entity in the virtual organization and between other virtual organization entities and establish security system structure which authorizes the users in the environment for establishing the gridding computation.

Description

technical field [0001] The invention is a solution for trust evaluation of trust entities in an open grid environment, and is mainly used to solve the problem of how users screen out trustworthy nodes in the grid, and then submit tasks. The invention belongs to the technical field of distributed computing security. Background technique [0002] Grid computing has developed into an important field in the computer industry. The difference between this field and distributed computing is that grid computing is more focused on resource sharing and collaborative work as well as high-performance positioning, and is dedicated to solving the problems of multiple individuals or organizations. issues related to resource sharing. With the emergence and rise of grid computing, software systems are changing from a closed, familiar user group and relatively static form to a more open, publicly accessible and highly dynamic service model. This transformation complicates the security analy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王汝传王芳张琳王海艳任勋益王杨
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products