• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (5): 46-50.

• 论文 • Previous Articles     Next Articles

Research on trustworthy model based on user behavior  

OU Wei1,WANG Yongjun1,HAN Wenbao2   

  1. (1.School of Computer Science,National University of Defense Technology,Changsha 410073;
    2.Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China)
  • Received:2011-02-22 Revised:2011-06-07 Online:2013-05-25 Published:2013-05-25

Abstract:

Traditional authorization and authentication solves the problem of trust of user identify, but not solves the problem of trust of user behavior. Therefore, the paper proposed a new trustworthy model based on user behavior so as to meet the needs of security systems. In this model, users of network service are regarded as subjects, and files and data in computer are regarded as objects. Different subjects and objects are assigned to different levels of confidentiality and integrity. A user' service request on system is mapped into the access from a subject to an object. In this model, security attributes and security strategies and rules used to restrict users' behavior are all defined. Hence, a security and trustworthy computer system is made up.

Key words: user behavior;trust;security attribute;security strategy;rule