Abstract

It is very difficult to identify the malicious acts of users and to control the future acts of users for the existing static certificate-based user management in an open grid environment because of the dynamics and uncertainty of user behavior. To address the problem, a method for user security management based on trust constraints was proposed. In this method, according to the result of trust computation, the trust black-list and white-list were established by monitoring the change of trust level of users, and trust policies that stated the relationship between user trust and asset value were set. The testing results show that, as a dynamic trust constraint of access control mechanism, the trust black-list, white-list and trust policies strengthen the constraints on the system authorization, and effectively control the user behaviors by associating user's capacity accessing to resources with his or her history behaviors, which improves system security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call