Abstract
Background: With the complexity of the network structure and the diversity of access, the access control model of distributed permissions management came into being.
Aims: The central idea of the model is to store the access permissions of all nodes in the model to the network nodes covered by the access control model, and let the neighboring nodes act as access control agents. That is, each node in the model is a routing node in the execution of a certain access control.
Methods: Considering the execution parameters of distributed access control model, the evaluation index of key node identification technology in distributed authorized access control model is established. Access control to achieve the management of distributed permissions. It is necessary to protect the key nodes in the model, increase the robustness of the access control model and support the smooth implementation of distributed access.
Results: This paper presents a key node recognition algorithm based on distributed access control magic. The application of key node recognition algorithm in distributed access control model in traditional network is compared.
Conclusion: Compared with the traditional key node recognition algorithm in the distributed access control model, the algorithm proposed in this paper is more accurate.
Keywords: Distributed access control, key nodes, network security, internet, environment, multi-network convergence communication network system.
Graphical Abstract