An integrated framework for trust-based access control for open systems

被引:0
|
作者
Chuang, Michael [1 ]
Phoonivuthisarn, Suronapee [1 ]
Joshi, James B. D. [1 ]
机构
[1] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An important requirement of systems or application domains in emerging open environments is the capability to share information and services with other application domains that have different sets of protection requirements. When a domain needs to allow entities from previously unknown domains to access its resources, mechanisms should be in place to allow negotiating trust and services based on the sharing requirements of the interacting domains. We emphasize that a holistic framework for requirements-driven trust based secure interoperation is needed to facilitate interacting domains to access each other's local resources through access control policy mapping between the domains. In this paper, we present our ongoing work on developing a comprehensive framework for a trust based access control for secure interoperation, which tightly integrates role-based access control and inter-domain policy mapping mechanism with an integrated, game-theory based trust and service negotiation process. The framework being developed aims to address the complex requirements of an environment that represents the convergence of grid, peer-to-peer and mobile environments and workflow and multimedia technologies.
引用
收藏
页码:423 / +
页数:4
相关论文
共 50 条
  • [1] An integrated framework for trust-based access control for open systems
    Chuang, Michael
    Phooinvuthisarn, Suronapee
    Joshi, James B. D.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 346 - +
  • [2] An integrated framework for trust-based access control for open systems
    Chuang, Michael
    Phoomvuthisam, Suronapee
    Joshi, James B. D.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 481 - +
  • [3] Trust-based access control for collaborative systems
    Bedi, Punam
    Kaur, Harmeet
    Gupta, Bhavna
    [J]. JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 109 - 126
  • [4] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514
  • [5] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [6] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [7] A trust-based dynamic access control model
    Ma, Shunan
    He, Jingsha
    Gao, Feng
    Sun, Xuguang
    [J]. Journal of Information and Computational Science, 2010, 7 (10): : 2165 - 2173
  • [8] Trust-Based Access Control for Collaborative System
    Liu, Yichun
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 444 - 448
  • [9] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [10] Formal Description of Trust-based Access control
    Ma Xiaoning
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385