Trustworthiness Model

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 138 Experts worldwide ranked by ideXlab platform

Wang Lunwei - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness Model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

  • Access request Trustworthiness in weighted access control framework
    Wuhan University Journal of Natural Sciences, 2005
    Co-Authors: Wang Lunwei, Liao Xiangke, Wang Huai-min
    Abstract:

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a Trustworthiness Model for access request is also given. In this Model, we give the measure of Trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request Trustworthiness factor among multiple policies, and get the final Trustworthiness factor to decide whether authorizing. In this Model, authorization decision is given according to the calculation of request Trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness Model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Wang Huaimin - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness Model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Wang Huai-min - One of the best experts on this subject based on the ideXlab platform.

  • Access request Trustworthiness in weighted access control framework
    Wuhan University Journal of Natural Sciences, 2005
    Co-Authors: Wang Lunwei, Liao Xiangke, Wang Huai-min
    Abstract:

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a Trustworthiness Model for access request is also given. In this Model, we give the measure of Trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request Trustworthiness factor among multiple policies, and get the final Trustworthiness factor to decide whether authorizing. In this Model, authorization decision is given according to the calculation of request Trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness Model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Liao Xiangke - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness Model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

  • Access request Trustworthiness in weighted access control framework
    Wuhan University Journal of Natural Sciences, 2005
    Co-Authors: Wang Lunwei, Liao Xiangke, Wang Huai-min
    Abstract:

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a Trustworthiness Model for access request is also given. In this Model, we give the measure of Trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request Trustworthiness factor among multiple policies, and get the final Trustworthiness factor to decide whether authorizing. In this Model, authorization decision is given according to the calculation of request Trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness Model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

He Lianyue - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness Model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness Model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted Model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness Model. The Model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The Model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.