{"title":"基于信任的工作流访问控制策略研究","authors":"Rui Ma, Linying Xu, Pengxiang Gao","doi":"10.1109/WISA.2014.24","DOIUrl":null,"url":null,"abstract":"The traditional workflow access control strategy has often found to be inadequate to detect and restrain malicious behavior effectively. With the aim to solve this problem, this paper presents a new workflow access control model based on trust, and a new access control strategy with an authorization process. This strategy introduces user behavior evaluation, trust computation and role hierarchy into role access control strategy. Through the trust computation of user behavior, it can dynamically adjust user's role and permissions, realizing the dynamic authorization process. Theory analysis and simulation experiments show that this access control strategy is more sensitive in dynamic authorization, and it has fine-grained trust computation. Also this strategy can detect malicious behaviors in time, effectively restraining malicious behavior harming the system so enhancing the security of the system.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research of Workflow Access Control Strategy based on Trust\",\"authors\":\"Rui Ma, Linying Xu, Pengxiang Gao\",\"doi\":\"10.1109/WISA.2014.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The traditional workflow access control strategy has often found to be inadequate to detect and restrain malicious behavior effectively. With the aim to solve this problem, this paper presents a new workflow access control model based on trust, and a new access control strategy with an authorization process. This strategy introduces user behavior evaluation, trust computation and role hierarchy into role access control strategy. Through the trust computation of user behavior, it can dynamically adjust user's role and permissions, realizing the dynamic authorization process. Theory analysis and simulation experiments show that this access control strategy is more sensitive in dynamic authorization, and it has fine-grained trust computation. Also this strategy can detect malicious behaviors in time, effectively restraining malicious behavior harming the system so enhancing the security of the system.\",\"PeriodicalId\":366169,\"journal\":{\"name\":\"2014 11th Web Information System and Application Conference\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 11th Web Information System and Application Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WISA.2014.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 11th Web Information System and Application Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISA.2014.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research of Workflow Access Control Strategy based on Trust
The traditional workflow access control strategy has often found to be inadequate to detect and restrain malicious behavior effectively. With the aim to solve this problem, this paper presents a new workflow access control model based on trust, and a new access control strategy with an authorization process. This strategy introduces user behavior evaluation, trust computation and role hierarchy into role access control strategy. Through the trust computation of user behavior, it can dynamically adjust user's role and permissions, realizing the dynamic authorization process. Theory analysis and simulation experiments show that this access control strategy is more sensitive in dynamic authorization, and it has fine-grained trust computation. Also this strategy can detect malicious behaviors in time, effectively restraining malicious behavior harming the system so enhancing the security of the system.