Multi-level delegations with trust management in access control systems

被引:0
|
作者
Min Li
Xiaoxun Sun
Hua Wang
Yanchun Zhang
机构
[1] University of Southern Queensland,Department of Mathematics & Computing
[2] Australian Council for Educational Research,School of Engineering and Science
[3] Victoria University,undefined
关键词
Access control; Database management; Trust evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that the privileges should be delegated to a person who is trustworthy. In this paper, we propose a multi-level delegation model with trust management in access control systems. We organize the delegation tasks into three levels, Low, Medium, and High, according to the sensitivity of the information contained in the delegation tasks. It motivates us that the more sensitive the delegated task is, the more trustworthy the delegatee should be. In order to assess how trustworthy a delegatee is, we devise trust evaluation techniques to describe a delegatee’s trust history and also predict the future trend of trust. In our proposed delegation model, a delegatee with a higher trust level could be assigned with a higher level delegation task. Extensive experiments show that our proposed multi-level delegation model is effective in accurately predicting trust and avoiding sensitive information disclosure.
引用
收藏
页码:611 / 626
页数:15
相关论文
共 50 条
  • [31] Multi-level Pressure Switching Displacement Servo Control Systems
    [J]. Guo, Baofeng (guobf@ysu.edu.cn), 1600, Chinese Mechanical Engineering Society (28):
  • [32] Automation Issues in Multi-Level Control Systems of Petroleum Refinery
    Zykina, A. V.
    Kaneva, O. N.
    Savelev, M. Yu.
    Fink, T. Yu.
    [J]. OIL AND GAS ENGINEERING (OGE-2019), 2019, 2141
  • [33] Coordinated control of multi-level distributed-parameter systems
    Wang, QY
    Zhu, Y
    [J]. 2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1654 - 1657
  • [34] Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture
    Dutta, Ratna
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 57 - 71
  • [35] Multi-level on-demand access control for flexible data sharing in cloud
    Sabitha, S.
    Rajasree, M. S.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1455 - 1478
  • [36] Hierarchical-key renewal scheme for multi-level multicast access control
    Shin, DongMyung
    Park, HeeUn
    Won, YooJae
    Cho, ByungJin
    [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 523 - 526
  • [37] Using Multi-Level Role Based Access Control for Wireless Classified Environments
    Burgner, Daniel E.
    Wahsheh, Luay A.
    Ahmad, Aftab
    Graham, Jonathan M.
    Hinds, Cheryl V.
    Williams, Aurelia T.
    DeLoatch, Sandra J.
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL II, 2011, : 828 - 832
  • [38] A Multi-level Security Access Control Framework for Cross-Domain Networks
    Zhang, Hongbin
    Chang, Jiang
    Wang, Junshe
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 316 - 319
  • [39] Visualization for Access Control Policy Analysis Results using Multi-Level Grids
    Rao, Prathima
    Ghinita, Gabriel
    Bertino, Elisa
    Lobo, Jorge
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 25 - +
  • [40] Coded Caching for Multi-level Popularity and Access
    Hachem, Jad
    Karamchandani, Nikhil
    Diggavi, Suhas N.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (05) : 3108 - 3141