An Access Control Model for Trustworthy Network

Fujun Feng,Chuang Lin,Junshan Li
DOI: https://doi.org/10.1109/NSWCTC.2009.405
2009-01-01
Abstract:Trustworthy network is the inevitable trend in the development of high trusted computing and Internet. It is beyond the traditional information security including confidentiality, integrity and availability, but on the survivability and controllability. Trustworthiness of users on identity and behaviors is very important for trustworthy network, which can be realized by access control technology. Firstly, we discuss the security requirements of access control in trustworthy network. Then we propose a Trust and Context based Access Control (TCAC) model, and describe the core, hierarchical and constrained TCAC in detail. Finally, a trust evaluation mechanism is presented.
What problem does this paper attempt to address?