A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Trust- and Property-based Access Control Model
2008
Electronical Notes in Theoretical Computer Science
In open and distributed property-based access control systems, access rights are granted because of presented certified properties. ...
However, controlling agents base their access decisions not only on presented certified properties. ...
To address this problem, we have proposed a simple trust-and property-based access control model. ...
doi:10.1016/j.entcs.2007.12.026
fatcat:3zwxfky3lzag3efbbns7rchpju
Trust-based Access Control Model with Quantification Method for Protecting Sensitive Attributes
2022
International Journal of Advanced Computer Science and Applications
Therefore, a trust-based access control (TBAC) model is proposed to protect sensitive attributes. ...
Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. ...
model [39] , and situation-based access control [40] . ...
doi:10.14569/ijacsa.2022.0130282
fatcat:usq4ymhgbnbhtgcbhbvyo3avl4
Context and Trust Aware Workflow Oriented Access Framework
2016
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering
The concept of static binding in role based access model is extended to support dynamic access control by including context awareness and trust relationship between owner and user. ...
This paper focuses on design of dynamic access control approach for business process. Here, we propose a context and trust aware workflow oriented access framework. ...
Context and Trust Aware Access Approach It integrates the concept of workflow based access control, context aware role based access control, trust based access approach control, and SLA aware trust model ...
doi:10.18293/seke2016-179
dblp:conf/seke/BhattasaliCCS16
fatcat:3k5kapmkxnheressuhqyd5hori
A Measurable Approach for Access and Control Modeling in SOA
2011
International Journal of Engineering and Manufacturing
Our model is mainly based on the role access policy, extended with trust authority transition and integration mechanism, to fulfill an extensive and measurable access control modeling approach with Crypto-CCS ...
However, problems in security guard for service access remains unresolved especially for the measurable one. we proposed a novel access control model, which we called SACM: Service Access Control Model ...
Our model is mainly based on the role access policy, extended with trust authority transition and integration mechanism, to fulfill an extensive and measurable access control modeling approach. ...
doi:10.5815/ijem.2011.02.09
fatcat:mjag4ql4bnfphlwcxx3raadzta
A Trust-Based Access Control Model for Pervasive Computing Applications
[chapter]
2009
Lecture Notes in Computer Science
Fine-grained access control is achieved depending on the trust levels of users. We develop a class of trust-based access control models having very formal semantics, expressed in graph theory. ...
In this work, we propose a trust based approach for access control for pervasive computing systems. Our previously proposed belief based trust model is used to evaluate the trustworthiness of users. ...
Introduction Traditional access control models like Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC) do not work well in pervasive computing systems ...
doi:10.1007/978-3-642-03007-9_22
fatcat:3rhqkn3jdjdc5c253nd53yaapu
Access Control in Internet of Things: A Survey
2017
DEStech Transactions on Engineering and Technology Research
This paper focuses on building an access control model and system based on trust computing. ...
This is a new field of access control techniques which includes Access Control, Trust Computing, Internet of Things, network attacks, and cheating technologies. ...
The paper focuses on building an access control model and system based on trust computing, which is a new field of access control techniques that includes Access Control, Trust Computing, Internet of Things ...
doi:10.12783/dtetr/apetc2017/11295
fatcat:26nimozfpzbipbclbhiscdlbpa
TrustBAC
2006
Proceedings of the eleventh ACM symposium on Access control models and technologies - SACMAT '06
In this work, we propose a trust based access control model called TrustBAC. It extends the conventional role based access control model with the notion of trust levels. ...
The TrustBAC model thus incorporates the advantages of both the role based access control model and credential based access control models. ...
The views presented here are solely that of the authors and do not necessarily represent those of the AFRL or the FAA. The authors would like to thank Mr. Robert Vaeth of the AFRL and Mr. ...
doi:10.1145/1133058.1133067
dblp:conf/sacmat/ChakrabortyR06
fatcat:uydn4fnr7nhg5kgek337d5trhu
Towards Robust and Effective Trust Management for Security: A Survey
2014
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
There is a need for robust and effective trust management. ...
In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems. ...
, and partially supported by the A*STAR SERC grant (1224104047) awarded to Dr. ...
doi:10.1109/trustcom.2014.65
dblp:conf/trustcom/WangMLZ14
fatcat:mg6qxpymazew7eonimcgwwtvmm
A Framework for Flexible Access Control in Digital Library Systems
[chapter]
2006
Lecture Notes in Computer Science
These motivate us to propose a trust-based authorization model for digital libraries. Access privileges can be associated with both objects and content classes. ...
a fine-grained access control. ...
Different models exist for specifying access control policies like discretionary access control, mandatory access control and role-based access control. ...
doi:10.1007/11805588_18
fatcat:wfqy4hix75blxbmriwkwgzfyue
Dynamic access control
2003
Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03
We also explore the issues related to preserving safety properties and trust assumptions during this process. ...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. ...
ACKNOWLEDGMENTS The authors are grateful to Apu Kapadia, Geetanjali Sampemane, Seung Yi, Christopher Andrews and the anonymous reviewers for useful comments and suggestions. ...
doi:10.1145/775439.775442
fatcat:5edu6rwh7nhepee6hz47fhi6jy
Dynamic access control
2003
Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03
We also explore the issues related to preserving safety properties and trust assumptions during this process. ...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. ...
ACKNOWLEDGMENTS The authors are grateful to Apu Kapadia, Geetanjali Sampemane, Seung Yi, Christopher Andrews and the anonymous reviewers for useful comments and suggestions. ...
doi:10.1145/775412.775442
dblp:conf/sacmat/NaldurgC03
fatcat:l36cejsb2jhuljtmxpvwhp2swm
Engineering Trust Management into Software Models
2007
International Workshop on Modeling in Software Engineering (MISE'07: ICSE Workshop 2007)
One significant aspect of security involves access control. This paper proposes a multi-layer model detailing the integration of trust management access control with an application's model behavior. ...
Our previous work focused on modeling the dynamic changes of a trust management policy for the purpose of verifying security properties using model checking. ...
Various access control models have been studied including access control matrices and lists [8] , role-based [16, 17] , and logic-based [21] . ...
doi:10.1109/mise.2007.5
dblp:conf/icse/ReithNW07
fatcat:i5giijqpufafhp4l5otnuh3wai
A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing
2013
International Journal of Digital Content Technology and its Applications
Based on cloud computing and remote certification, this paper proposed a usage control architecture and bidirectional integrality verification security protocol of multimedia digital contents in cloud ...
DRM controller is set in cloud multimedia server by as a service, and user calls DRM controlling function through client GUI. ...
to a large processor to a distributed task processing model based on network, and then to the recent cloud computing model based on demand. ...
doi:10.4156/jdcta.vol7.issue4.95
fatcat:zcua5f5is5cxtcppv7zfuziuqu
Role Performance Trust-Based Access Control for Protecting Sensitive Attributes
2016
International Journal of Security and Its Applications
In this paper, we propose a new access control model based on trust called role performance trust-based access control to permit trusted user access to sensitive attributes. ...
Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. ...
Propose a new access control model called role performance trust -based access control model (RPTBAC) to protect sensitive attributes. 2. ...
doi:10.14257/ijsia.2016.10.12.13
fatcat:55rkdww2nbajzc2vrw4ud3x75a
Security Policies in Distributed CSCW and Workflow Systems
2010
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented. ...
In this paper, we have surveyed Computer-Supported Cooperative Work (CSCW) and workflow systems based on a time-line and have categorized the systems based on their emphasis on user or process interactions ...
Based on this fact, later access control models have placed constraints on access control structures to facilitate analysis of safety properties, such as, Typed Access Matrix [40] . ...
doi:10.1109/tsmca.2010.2046727
fatcat:ysjm5nn5hjeehpfa7k3xbmja64
« Previous
Showing results 1 — 15 out of 279,420 results