Indexed by:
Abstract:
Background: With the complexity of the network structure and the diversity of access, the access control model of distributed permissions management came into being. Aims: The central idea of the model is to store the access permissions of all nodes in the model to the network nodes covered by the access control model, and let the neighboring nodes act as access control agents. That is, each node in the model is a routing node in the execution of a certain access control. Methods: Considering the execution parameters of distributed access control model, the evaluation index of key node identification technology in distributed authorized access control model is estab-lished. Access control to achieve the management of distributed permissions. It is necessary to pro-tect the key nodes in the model, increase the robustness of the access control model and support the smooth implementation of distributed access. Results: This paper presents a key node recognition algorithm based on distributed access control magic. The application of key node recognition algorithm in distributed access control model in traditional network is compared. Conclusion: Compared with the traditional key node recognition algorithm in the distributed access control model, the algorithm proposed in this paper is more accurate. © 2021 Bentham Science Publishers.
Keyword:
Reprint Author's Address:
Email:
Source :
Recent Advances in Computer Science and Communications
ISSN: 2666-2558
Year: 2021
Issue: 5
Volume: 14
Page: 1431-1439
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count: 2
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 1
Affiliated Colleges: