Trust and role based access control for secure interoperation ("TracSI")

被引:0
|
作者
Phoomvuthisam, Suronapee [1 ]
机构
[1] Mahanakorn Univ Technol, Fac Informat Sci & Technol, Bangkok, Thailand
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An important requirement of emerging systems is to be able to share information with other systems over open environments. when a system needs to allow previously unknown entities to access its resources, mechanisms should be in place to allow negotiating trust and services based on pre-defined sharing requirements. We emphasize that a framework for requirements-driven secure interoperation is needed in a loosely coupled environment to facilitate two interacting domains to access each other's local resources through access control policy mapping between the domains. In this paper, we present a framework implementation for a trust and role based access control for secure interoperation ("TracSI"), which tightly integrates generalized temporal role based access control ("GTRBAC') and policy mapping mechanism with an integrated, game-theory based trust and service negotiation process.
引用
收藏
页码:1458 / 1463
页数:6
相关论文
共 50 条
  • [21] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [22] A trust-role based context aware access control model
    Chen Lu
    Zhou Qing
    Huang Gao-feng
    Zhang Li-qiang
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 371 - 376
  • [23] Trust-based user-role assignment in role-based access control
    Takabi, Hassan
    Amini, Morteza
    Jalili, Rasool
    [J]. 2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
  • [24] Trust based Authorization and Access Control
    Feng Fujun
    Li Junshan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
  • [25] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [26] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [27] Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks
    Xueming Zhang
    Haitao Deng
    Zenggang Xiong
    Yanchao Liu
    Ying Rao
    Yuanlin Lyu
    Yuan Li
    Delin Hou
    Youfeng Li
    [J]. Journal of Signal Processing Systems, 2024, 96 : 153 - 168
  • [28] Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks
    Zhang, Xueming
    Deng, Haitao
    Xiong, Zenggang
    Liu, Yanchao
    Rao, Ying
    Lyu, Yuanlin
    Li, Yuan
    Hou, Delin
    Li, Youfeng
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2024, 96 (02): : 153 - 168
  • [29] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [30] Secure information sharing using attribute certificates and role based access control
    Godavari, G
    Chow, E
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 269 - 276