Research of access authorization model based on trust negotiation in the P2P network

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This article constructs the access authorization model under the P2P network, which solves the resource access authorization problem under high security environment. Firstly, it designs the access control strategy of the model, then analyzes the four role logical operators and designs the grammar rules of the access control strategy. Lastly, construct a high security trust negotiation based on security function, which makes the security of the model has been greatly improved. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Ye, J., Wang, Y., & Wang, Y. (2011). Research of access authorization model based on trust negotiation in the P2P network. In Communications in Computer and Information Science (Vol. 201 CCIS, pp. 422–427). https://doi.org/10.1007/978-3-642-22418-8_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free