How much is "enough"? Risk in trust-based access control

被引:0
|
作者
Dimmock, N [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:281 / 282
页数:2
相关论文
共 50 条
  • [21] Research on trust-based access control in medical cloud environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 14 - 14
  • [22] An integrated framework for trust-based access control for open systems
    Chuang, Michael
    Phooinvuthisarn, Suronapee
    Joshi, James B. D.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 346 - +
  • [23] Trust-based Access Control for Privacy Protection in Collaborative Environment
    Li, Min
    Wang, Hua
    Ross, David
    [J]. ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 425 - +
  • [24] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [25] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257
  • [26] An integrated framework for trust-based access control for open systems
    Chuang, Michael
    Phoomvuthisam, Suronapee
    Joshi, James B. D.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 481 - +
  • [27] Formal Modeling of Trust-Based Access Control in Dynamic Coalitions
    Sarrouh, Nadim
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 224 - 229
  • [28] An attribute aggregation architecture with trust-based evaluation for access control
    Lee, Jaewon
    Kim, Heeyoul
    Hong, Joon Sung
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 1011 - 1014
  • [29] A Trust-based Access Control Scheme for e-Health Cloud
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    [J]. 2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [30] Modeling MAC Permissions Using Trust-Based Access Control and Actions
    Danilescu, Marcel
    Danilescu, Laura
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 1547 - 1551