Trust and role based access control for secure interoperation ("TracSI")

被引:0
|
作者
Phoomvuthisam, Suronapee [1 ]
机构
[1] Mahanakorn Univ Technol, Fac Informat Sci & Technol, Bangkok, Thailand
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An important requirement of emerging systems is to be able to share information with other systems over open environments. when a system needs to allow previously unknown entities to access its resources, mechanisms should be in place to allow negotiating trust and services based on pre-defined sharing requirements. We emphasize that a framework for requirements-driven secure interoperation is needed in a loosely coupled environment to facilitate two interacting domains to access each other's local resources through access control policy mapping between the domains. In this paper, we present a framework implementation for a trust and role based access control for secure interoperation ("TracSI"), which tightly integrates generalized temporal role based access control ("GTRBAC') and policy mapping mechanism with an integrated, game-theory based trust and service negotiation process.
引用
收藏
页码:1458 / 1463
页数:6
相关论文
共 50 条
  • [1] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [2] Ensuring secure interoperation of access control in a multidomain environment
    Yang, Benyuan
    Luo, Lili
    Wang, Zhimeng
    COMPUTERS & SECURITY, 2024, 137
  • [3] Integrating trust and role for secure interoperation in multi-domain environment
    Lu, Jianfeng
    Li, Ruixuan
    Lu, Zhengding
    Li, Bing
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 77 - 82
  • [4] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
  • [5] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [6] Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm
    Bhise, Avdhut Suryakant
    Latif, Patil M. Toushif
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 87 - 97
  • [7] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [8] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [9] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [10] Ontology based hybrid access control for automatic interoperation
    Sun, Yuqing
    Pan, Peng
    Leung, Ho-fung
    Shi, Bin
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 323 - +