An administrative model for UCONABC
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Survey: Usage control in computer security: A survey
Computer Science Review
Hi-index | 0.00 |
Based on the concept of credibility and a new access control model----usage control (UCON), this paper researched the access control in the dissemination of usage rights for digital information and realized an application system for resource dissemination in the open network environment. In the system, the membership function and fuzzy transform principle in the fuzzy set theory are adopted to calculate the value of credibility. Additionally, we gave the derivation rule of credibility through vector link operation. Comparing with traditional certificate authorization, using credibility for authorization can change the granted right dynamically and control the depth of resource dissemination efficiently, making the authorization and revocation of rights convenient and flexible. Through using credibility for evaluating trust relations and considering DRM policy in access control, we achieved the combinative application of the traditional access control, trust management and digital rights management (DRM) covered in usage control. Key words: credibilityusage controlresource disseminationDRM policy