139,082 Hits in 5.0 sec

A Computational Dynamic Trust Model for User Authorization

Chang Young Jung
2015 Asia-pacific Journal of Convergent Research Interchange  
During this paper we have a tendency to propose a procedure dynamic trust model for user authorization, nonmoving in findings from scientific discipline.  ...  Development of authorization mechanisms for secure data access by an outsized community of users in Associate in Nursing open atmosphere is a crucial downside within the ever-growing web world.  ...  Tool kit: Android Phone Database: My SQL Java Version: J2SDK1.5 Conclusion This paper we've got an inclination to propose a procedure dynamic trust model for user authorization, static in findings from  ... 
doi:10.21742/apjcri.2015.12.01 fatcat:wraqgjv3lrau7kuop4dwwtoooy

TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing

Sultan Ullah, Zheng Xuefeng, Zhou Feng
2013 International Journal of Computer Applications  
In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources services against security infringements.  ...  On the basis of trust, and role based access control model, a new novel framework of flexible cross domain access control framework is presented.  ...  A dynamic RBAC model is proposed for cloud computing environment to remove the deficiencies in RBAC model [7] [9].  ... 
doi:10.5120/10049-4636 fatcat:zaiapnxcefewhf7p6eklesygi4

Blacklisting and Forgiving Coarse-grained Access Control for Cloud Computing

Khaled Riad
2016 International Journal of Security and Its Applications  
A trust level has to be calculated for each user using different factors, then if the user became trusted, it can be authorized for some permissions based on its trust level, otherwise it is still prohibited  ...  Through the formal trust defined in Section 2;  A new access control model (BF-CAC) has been proposed, the model has a set of features that distinguish it from current models proposed for cloud computing  ...  Acknowledgments We would like thank the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.14257/ijsia.2016.10.11.17 fatcat:wqaldv7hlrdlbhcjtfcqajs3uy

Research on Resource Allocation Scheme Based on Access Control in Cloud Computing Environment

Jun-She Wang, Jin-Liang Liu, Hong-Bin Zhang
2015 2015 International Conference on Computer Science and Applications (CSA)  
In this paper, we propose a new dynamic resource allocation scheme -Access Control-based Resource Allocation (ACRA) for cloud users in order to address some deficiencies of the current resources allocation  ...  Experimental results show that the ACRA scheme can provide basis for allocating resources dynamically and reasonably to cloud users with different behaviors and improve resource utilization in cloud computing  ...  The scheme then decides authorization rules for cloud users and provides a mechanism for dynamic permission adjustment.  ... 
doi:10.1109/csa.2015.59 fatcat:7vkcxk7b7fhwpcr7xjqsah35e4

Access Control Based on Trust Policy in Open Grid Environment

Li Ting Gao, Zhen Yan Wang
2013 Advanced Materials Research  
This paper proposed a model for user security management.  ...  It also can establish trust policy based on assets importance and user trust level, specify the relationship between user trust and assets value and take it as a dynamic trust constraint for access control  ...  Although the authorized model it used can achieve the distributed processing for authority, it difficult to keep abreast of the user actual behavior in this distributed, dynamic grid computing.  ... 
doi:10.4028/ fatcat:35nvd53wpjexrjyps2zwimxzxy

Trust Model for Measuring Security Strength of Cloud Computing Service

Rizwana Shaikh, M. Sasikumar
2015 Procedia Computer Science  
Adequacy of the model is also verified by evaluating trust value for existing cloud services. Trust model acts as a benchmark and ranking service to measure security in a cloud computing environment.  ...  A trust model measures the security strength and computes a trust value.  ...  Section4 describes extending this model into a dynamic trust model with a set of dynamic parameters. Section 5 discusses incorporating the model in cloud computing environment.  ... 
doi:10.1016/j.procs.2015.03.165 fatcat:gbl6i46utncmzodbatuwrde7ja

ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

Guoyuan Lin, Yuyu Bie, Min Lei, Kangfeng Zheng
2013 International Journal of Computational Intelligence Systems  
Trust relationships between entities in cloud computing are dynamic, uncertain and hard to quantify.  ...  behavior trust model: ACO-BTM.  ...  Yoon et al proposed a credible model for cloud resources based on authorization chain in Ref. 10 .  ... 
doi:10.1080/18756891.2013.864479 fatcat:hs7ogv3c3nbifkc232bu46mlxi

Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment

G. Jagadamba, B Sathish Babu
2016 International Journal of Systems and Service-Oriented Engineering  
The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies.  ...  The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider.  ...  An effort to integrate trust and privacy was done in an extended Attribute-Based Access Control model for critical situations for registered and non-registered users (Sun, Lili, Yong et al., 2014) .  ... 
doi:10.4018/ijssoe.2016100101 fatcat:kpyxnz4zl5cg7kejadfiu23noe

Trust Based Access Control Policy in Multi-domain of Cloud Computing

Guoyuan Lin, Yuyu Bie, Min Lei
2013 Journal of Computers  
This paper intends to provide a trust-based access control mechanism for cloud computing considering its multi-domain aspects.  ...  Firstly, trust is introduced into cloud computing environment and trust relationships between users and cloud platform are built.  ...  Authorization is no longer a static mechanism based on identity trust, but a dynamic mechanism combined with identity trust and behavior trust.  ... 
doi:10.4304/jcp.8.5.1357-1365 fatcat:woci457o2vegrjvobhpiriudiu

Security in Pervasive Computing: Current Status and Open Issues

Munirul M. Haque, Sheikh Iqbal Ahamed
2006 International Journal of Network Security  
As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users --though for most it will be an afterthought, like many other computing  ...  With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility.  ...  Acknowledgement The authors would like to thank Paula Stroud for her valuable assistance in improving the paper.  ... 
dblp:journals/ijnsec/HaqueA06 fatcat:qvinqrcjn5gedaribcdjuyl44m

Secure Allocation of Resources in Cloud Using Trust

Usha Divakarla, K. Chandrasekaran
2016 International Journal of Computer Network and Information Security  
As a result all the entities in cloud and cloud computing environment should be trusted by each other and the entities that have communication should have valid trust on each other.  ...  Our model is platform independent and also helps in calculating trust while migrating to another platform. The result shows that the proposed model is much more efficient in terms of computation time.  ...  Authors [21] developed a general trust model based on QoS selection and Certain Trust Model which uses QoS parameters like direct trust, user feedback, user preference, etc. to calculate trust of the  ... 
doi:10.5815/ijcnis.2016.01.06 fatcat:ip6asxf3vrchlp65w2xnxp5wm4

A Survey on Zero Trust Architecture: Challenges and Future Trends

Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, Xiangjie Ma, Yan Huo
2022 Wireless Communications and Mobile Computing  
Zero trust is a new type of network security model, which is based on the concept of never trust and always verify.  ...  Our goal is to provide support for the research and application of future zero trust architectures.  ...  Under the zero trust model, we need to solve the problems of minimizing authorization and dynamic authorization control for users.  ... 
doi:10.1155/2022/6476274 fatcat:s6yy7muhbrgzvlfqebyzsxk5oy

Context-sensitive authorization for asynchronous communications

V. Hourdin, J.-Y. Tigli, S. Lavirotte, G. Rey, M. Riveill
2009 2009 International Conference for Internet Technology and Secured Transactions, (ICITST)  
Quasi-static authorization Almost ten years ago, static information for authentication and authorization began to be seen as a limitation  ...  On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations.  ...  Of course, placing a trusted entity in users computing environment can be recusant.  ... 
doi:10.1109/icitst.2009.5402550 fatcat:nnvovsxnu5hdvcrmtmnzmnulti

Dynamic Trust Level Decision in Pervasive Environment

Sonali Goyal, Neera Batra
2016 GRENZE International Journal of Engineering and Technology  
This paper focuses on two main issues: (1) to access the required information about a user that whether a user is authorized one or not and to achieve this goal an access controlled architecture has been  ...  Index Terms-security in pervasive computing, trust evaluation, smart environment.  ...  Kagal proposed a trust model for pervasive computing environments. This model is not a computational trust model and uses certificates to determine whether an entity is trusted or not.  ... 
doi:10.21647/gijet/2016/v2/i2/48897 fatcat:to6zsuhvbvbdbffm634hefxduu

Real-time Evaluation Mechanism Based on Double Evidence Classification of User Behavior

Jiale Zhang, Guiling Zhang, Xiufang Zhang
2016 International Journal of Security and Its Applications  
In order to solve the problems of subjectivity, limitations and static in traditional trusted network user behavior evaluation models, we have to find a real-time and dynamic evaluation method for user  ...  In this paper, the authors construct a real-time evaluation mechanism based on double evidence classification of user behavior (DEC-UB).  ...  At the same time, as the user behavior trust is not only more detailed than the control granularity of the identity trust, but also is a computation dynamic trust model for user authorization, it will  ... 
doi:10.14257/ijsia.2016.10.12.04 fatcat:un5zohjo5nbobehyt7vctnmqdm
« Previous Showing results 1 — 15 out of 139,082 results