Skip to content
2000
Volume 14, Issue 5
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

Background: With the complexity of the network structure and the diversity of access, the access control model of distributed permissions management came into being. Aims: The central idea of the model is to store the access permissions of all nodes in the model to the network nodes covered by the access control model, and let the neighboring nodes act as access control agents. That is, each node in the model is a routing node in the execution of a certain access control. Methods: Considering the execution parameters of distributed access control model, the evaluation index of key node identification technology in distributed authorized access control model is established. Access control to achieve the management of distributed permissions. It is necessary to protect the key nodes in the model, increase the robustness of the access control model and support the smooth implementation of distributed access. Results: This paper presents a key node recognition algorithm based on distributed access control magic. The application of key node recognition algorithm in distributed access control model in traditional network is compared. Conclusion: Compared with the traditional key node recognition algorithm in the distributed access control model, the algorithm proposed in this paper is more accurate.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/2666255813666191120100513
2021-07-01
2025-08-19
Loading full text...

Full text loading...

/content/journals/rascs/10.2174/2666255813666191120100513
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test