Trust and role based access control for secure interoperation ("TracSI")

被引:0
|
作者
Phoomvuthisam, Suronapee [1 ]
机构
[1] Mahanakorn Univ Technol, Fac Informat Sci & Technol, Bangkok, Thailand
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An important requirement of emerging systems is to be able to share information with other systems over open environments. when a system needs to allow previously unknown entities to access its resources, mechanisms should be in place to allow negotiating trust and services based on pre-defined sharing requirements. We emphasize that a framework for requirements-driven secure interoperation is needed in a loosely coupled environment to facilitate two interacting domains to access each other's local resources through access control policy mapping between the domains. In this paper, we present a framework implementation for a trust and role based access control for secure interoperation ("TracSI"), which tightly integrates generalized temporal role based access control ("GTRBAC') and policy mapping mechanism with an integrated, game-theory based trust and service negotiation process.
引用
收藏
页码:1458 / 1463
页数:6
相关论文
共 50 条
  • [1] A secure, constraint-aware role-based access control interoperation framework
    Baracaldo N.
    Masoumzadeh A.
    Joshi J.
    [J]. Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 200 - 207
  • [2] Ensuring secure interoperation of access control in a multidomain environment
    Yang, Benyuan
    Luo, Lili
    Wang, Zhimeng
    [J]. COMPUTERS & SECURITY, 2024, 137
  • [3] Integrating trust and role for secure interoperation in multi-domain environment
    Lu, Jianfeng
    Li, Ruixuan
    Lu, Zhengding
    Li, Bing
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 77 - 82
  • [4] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
  • [5] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [6] Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm
    Bhise, Avdhut Suryakant
    Latif, Patil M. Toushif
    [J]. TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 87 - 97
  • [7] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    [J]. AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [8] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [9] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [10] Ontology based hybrid access control for automatic interoperation
    Sun, Yuqing
    Pan, Peng
    Leung, Ho-fung
    Shi, Bin
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 323 - +