How much is "enough"? Risk in trust-based access control

被引:0
|
作者
Dimmock, N [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:281 / 282
页数:2
相关论文
共 50 条
  • [1] Risk models for trust-based access control (TBAC)
    Dimmock, N
    Bacon, J
    Ingram, D
    Moody, K
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2005, 3477 : 364 - 371
  • [2] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [3] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [4] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [5] A trust-based dynamic access control model
    Ma, Shunan
    He, Jingsha
    Gao, Feng
    Sun, Xuguang
    [J]. Journal of Information and Computational Science, 2010, 7 (10): : 2165 - 2173
  • [6] Trust-Based Access Control for Collaborative System
    Liu, Yichun
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 444 - 448
  • [7] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [8] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385
  • [9] Trust-based access control for collaborative systems
    Bedi, Punam
    Kaur, Harmeet
    Gupta, Bhavna
    [J]. JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 109 - 126
  • [10] A trust-based access control model for virtual organizations
    Lin, Aizhong
    Vullings, Erik
    Dalziel, James
    [J]. GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 557 - +