Security Investigate

Trusted Network Authorization Scheme Based on Cloud Model

Download now Free registration required

Executive Summary

In order to solve the problems of system access authorization in trusted network, in view of the fuzziness of network environment, the randomness of user behavior and the subjectivity of historical experience, a secure authorization scheme based on the cloud model called CTAS is proposed. CTAS synthetically analyzes multiple trust characteristics and security threats of access in trusted network. The weights analysis method is used to extract the Security Degree of access. The cloud model is utilized to quantitatively construct the trusted benchmark cloud. The Security Level of access is qualitatively judged according to the Certainty Degree of the Security Degree attaching to the benchmark cloud. The access is authorized by the Security Level.

  • Format: PDF
  • Size: 775.23 KB