An attribute aggregation architecture with trust-based evaluation for access control

被引:3
|
作者
Lee, Jaewon [1 ]
Kim, Heeyoul [1 ]
Hong, Joon Sung [1 ]
机构
[1] Samsung Elect Co LTD, Software Labs, Suwon 443742, South Korea
关键词
D O I
10.1109/NOMS.2008.4575270
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control to the unfamiliar users is a key challenge in the distributed and pervasive computing environment. Attribute-based access control model is suitable where a service provider doesn't know every peer, since it authorizes the access request by their attributes which are more available than the identities or their roles. In this work, we present an attribute aggregation architecture for the attribute-based access control model.
引用
收藏
页码:1011 / 1014
页数:4
相关论文
共 50 条
  • [1] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [2] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [3] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [4] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [5] Trust-Based Access Control for Collaborative System
    Liu, Yichun
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 444 - 448
  • [6] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385
  • [7] Trust-based access control for collaborative systems
    Bedi, Punam
    Kaur, Harmeet
    Gupta, Bhavna
    [J]. JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 109 - 126
  • [8] A trust-based collaborative access control model with policy aggregation for online social networks
    Rathore N.C.
    Tripathy S.
    [J]. Social Network Analysis and Mining, 2017, 7 (1)
  • [9] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +
  • [10] Risk models for trust-based access control (TBAC)
    Dimmock, N
    Bacon, J
    Ingram, D
    Moody, K
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2005, 3477 : 364 - 371