This article constructs the access authorization model under the P2P network, which solves the resource access authorization problem under high security environment. Firstly, it designs the access control strategy of the model, then analyzes the four role logical operators and designs the grammar rules of the access control strategy. Lastly, construct a high security trust negotiation based on security function, which makes the security of the model has been greatly improved. © 2011 Springer-Verlag.
CITATION STYLE
Ye, J., Wang, Y., & Wang, Y. (2011). Research of access authorization model based on trust negotiation in the P2P network. In Communications in Computer and Information Science (Vol. 201 CCIS, pp. 422–427). https://doi.org/10.1007/978-3-642-22418-8_60
Mendeley helps you to discover research relevant for your work.