Trusted Network Authorization Scheme Based on Cloud Model

In order to solve the problems of system access authorization in trusted network, in view of the fuzziness of network environment, the randomness of user behavior and the subjectivity of historical experience, a secure authorization scheme based on the cloud model called CTAS is proposed. CTAS synthetically analyzes multiple trust characteristics and security threats of access in trusted network. The weights analysis method is used to extract the Security Degree of access. The cloud model is utilized to quantitatively construct the trusted benchmark cloud. The Security Level of access is qualitatively judged according to the Certainty Degree of the Security Degree attaching to the benchmark cloud. The access is authorized by the Security Level.

Provided by: AICIT Topic: Security Date Added: Feb 2012 Format: PDF

Find By Topic