A trust-based access control model for virtual organizations

被引:0
|
作者
Lin, Aizhong [1 ]
Vullings, Erik [1 ]
Dalziel, James [1 ]
机构
[1] Macquarie Univ, MELCOE, Sydney, NSW 2109, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Virtual organizations normally use role-based access control mechanisms to assign permissions that allow users to access resources or services. Role-based access control mechanisms, however, have three limitations. First, as only one type of trust relationship --- resource trusts role --- exists in the mechanisms, more trust relationships that support more types of access controls in virtual organizations can not be established. Second, as roles are created in and limited to specific collaborative work places, the permissions only take effects in the local work places, and no global permissions can be set up. Finally, the attributes of users or groups, as important resources, have no control in the mechanisms. In other words, those attributes can not be released to any other user or group. To overcome these limitations, our research provides a trust-based access control model for virtual organizations. This paper presents the model, algorithm, implementations, and experimental results.
引用
收藏
页码:557 / +
页数:2
相关论文
共 50 条
  • [1] Trust-based access control in virtual learning community
    Wang, Shujuan
    Liu, Qingtang
    [J]. INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 514 - +
  • [2] A Trust and Reputation-based Access Control Model for Virtual Organizations
    Arasteh, Majid
    Amini, Morteza
    Jalili, Rasool
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 121 - 127
  • [3] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    [J]. DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [4] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [5] Trust-Based Fuzzy Access Control Model Research
    Su, Rina
    Zhang, Yongping
    He, Zhongkun
    Fan, Shaojing
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 393 - 399
  • [6] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [7] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [8] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257
  • [9] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [10] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +