{"title":"利用一种新的信任评估方法增强ABAC能力","authors":"M. Arasteh, S. Alizadeh","doi":"10.1109/ICCKE50421.2020.9303631","DOIUrl":null,"url":null,"abstract":"Access control is a security mechanism that prevents unauthorized access to sensitive resources. Attribute-Based Access Control model (ABAC) makes decisions by the considerations of subjects’ attributes. Although it has many advantages, it is not dynamic. In dynamic environments, the system should be able to change the users’ permissions according to their manner of activities. So, this paper proposes using trust besides ABAC. The introduced method for the evaluation of trust employs both the Fuzzy Inference System (FIS) and Neural Networks (NN), which is called Fuzzy-Neural based trust (FNT). As trust is evaluated according to some predefined parameters, the proposed model uses FIS to assess each parameter. Next, the assessed parameters should be mixed to generate a single result. Since the definition of an exact function might be difficult and complicated, the proposed model employs the NN, which acts as a black box and generates an expected output after its learning process. For the evaluation of trust, the assessed parameters are fed to the NN to produce a final result. Whenever a subject’s trust is evaluated, then the proposed model makes the final AC decision by the consideration of both ABAC’s result and the amount of trust. Afterwards, we evaluate the proposed model and then highlight its advantages by comparing with some other famous AC models.","PeriodicalId":402043,"journal":{"name":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Using a Novel Method for Trust Evaluation to Enhance ABAC Capabilities\",\"authors\":\"M. Arasteh, S. Alizadeh\",\"doi\":\"10.1109/ICCKE50421.2020.9303631\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control is a security mechanism that prevents unauthorized access to sensitive resources. Attribute-Based Access Control model (ABAC) makes decisions by the considerations of subjects’ attributes. Although it has many advantages, it is not dynamic. In dynamic environments, the system should be able to change the users’ permissions according to their manner of activities. So, this paper proposes using trust besides ABAC. The introduced method for the evaluation of trust employs both the Fuzzy Inference System (FIS) and Neural Networks (NN), which is called Fuzzy-Neural based trust (FNT). As trust is evaluated according to some predefined parameters, the proposed model uses FIS to assess each parameter. Next, the assessed parameters should be mixed to generate a single result. Since the definition of an exact function might be difficult and complicated, the proposed model employs the NN, which acts as a black box and generates an expected output after its learning process. For the evaluation of trust, the assessed parameters are fed to the NN to produce a final result. Whenever a subject’s trust is evaluated, then the proposed model makes the final AC decision by the consideration of both ABAC’s result and the amount of trust. Afterwards, we evaluate the proposed model and then highlight its advantages by comparing with some other famous AC models.\",\"PeriodicalId\":402043,\"journal\":{\"name\":\"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCKE50421.2020.9303631\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE50421.2020.9303631","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using a Novel Method for Trust Evaluation to Enhance ABAC Capabilities
Access control is a security mechanism that prevents unauthorized access to sensitive resources. Attribute-Based Access Control model (ABAC) makes decisions by the considerations of subjects’ attributes. Although it has many advantages, it is not dynamic. In dynamic environments, the system should be able to change the users’ permissions according to their manner of activities. So, this paper proposes using trust besides ABAC. The introduced method for the evaluation of trust employs both the Fuzzy Inference System (FIS) and Neural Networks (NN), which is called Fuzzy-Neural based trust (FNT). As trust is evaluated according to some predefined parameters, the proposed model uses FIS to assess each parameter. Next, the assessed parameters should be mixed to generate a single result. Since the definition of an exact function might be difficult and complicated, the proposed model employs the NN, which acts as a black box and generates an expected output after its learning process. For the evaluation of trust, the assessed parameters are fed to the NN to produce a final result. Whenever a subject’s trust is evaluated, then the proposed model makes the final AC decision by the consideration of both ABAC’s result and the amount of trust. Afterwards, we evaluate the proposed model and then highlight its advantages by comparing with some other famous AC models.