The Research and Application of Resource Dissemination Based on Credibility and UCON

Based on the concept of credibility and a new access control model----usage control (UCON), this paper researched the access control in the dissemination of usage rights for digital information and realized an application system for resource dissemination in the open network environment. In the system, the membership function and fuzzy transform principle in the fuzzy set theory are adopted to calculate the value of credibility. Additionally, we gave the derivation rule of credibility through vector link operation. Comparing with traditional certificate authorization, using credibility for authorization can change the granted right dynamically and control the depth of resource dissemination efficiently, making the authorization and revocation of rights convenient and flexible. Through using credibility for evaluating trust relations and considering DRM policy in access control, we achieved the combinative application of the traditional access control, trust management and digital rights management (DRM) covered in usage control. Key words: credibilityusage controlresource disseminationDRM policy

[1]  Jaehong Park,et al.  Originator control in usage control , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[2]  Fan-Tien Cheng,et al.  A holonic information exchange system for e-Manufacturing , 2004, 30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON 2004.

[3]  Chen Zhong,et al.  Research on a Fuzzy Logic-Based Subjective Trust Management Model , 2005 .

[4]  Xu Cheng,et al.  Researches on the platform of network manufacture products electronic trading based on fair exchange protocol and digital watermark , 2003, Proceedings of the 2003 IEEE International Conference on Intelligent Transportation Systems.

[5]  Zude Li,et al.  Towards a dynamic multi-policy dissemination control model: (DMDCON) , 2006, SGMD.

[6]  Ronggong Song,et al.  Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering , 2005, CDVE.

[7]  Chen Zhong,et al.  Research of Subjective Trust Management Model Based on the Fuzzy Set Theory , 2003 .

[8]  Jaehong Park,et al.  Usage Control: A Vision for Next Generation Access Control , 2003, MMM-ACNS.

[9]  Hyunseung Choo,et al.  Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.

[10]  Yuan Lei Research on “Usage Control” Model , 2005 .

[11]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[12]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.