Filters








279,420 Hits in 5.3 sec

A Trust- and Property-based Access Control Model

Joachim Biskup, Julia Hielscher, Sandra Wortmann
2008 Electronical Notes in Theoretical Computer Science  
In open and distributed property-based access control systems, access rights are granted because of presented certified properties.  ...  However, controlling agents base their access decisions not only on presented certified properties.  ...  To address this problem, we have proposed a simple trust-and property-based access control model.  ... 
doi:10.1016/j.entcs.2007.12.026 fatcat:3zwxfky3lzag3efbbns7rchpju

Trust-based Access Control Model with Quantification Method for Protecting Sensitive Attributes

Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd. Sani, Hamidah Ibrahim
2022 International Journal of Advanced Computer Science and Applications  
Therefore, a trust-based access control (TBAC) model is proposed to protect sensitive attributes.  ...  Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control.  ...  model [39] , and situation-based access control [40] .  ... 
doi:10.14569/ijacsa.2022.0130282 fatcat:usq4ymhgbnbhtgcbhbvyo3avl4

Context and Trust Aware Workflow Oriented Access Framework

Tapalina Bhattasali, Nabendu Chaki, Rituparna Chaki, Khalid Saeed
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
The concept of static binding in role based access model is extended to support dynamic access control by including context awareness and trust relationship between owner and user.  ...  This paper focuses on design of dynamic access control approach for business process. Here, we propose a context and trust aware workflow oriented access framework.  ...  Context and Trust Aware Access Approach It integrates the concept of workflow based access control, context aware role based access control, trust based access approach control, and SLA aware trust model  ... 
doi:10.18293/seke2016-179 dblp:conf/seke/BhattasaliCCS16 fatcat:3k5kapmkxnheressuhqyd5hori

A Measurable Approach for Access and Control Modeling in SOA

JunKai Gu, Ling Han, Bo Wang
2011 International Journal of Engineering and Manufacturing  
Our model is mainly based on the role access policy, extended with trust authority transition and integration mechanism, to fulfill an extensive and measurable access control modeling approach with Crypto-CCS  ...  However, problems in security guard for service access remains unresolved especially for the measurable one. we proposed a novel access control model, which we called SACM: Service Access Control Model  ...  Our model is mainly based on the role access policy, extended with trust authority transition and integration mechanism, to fulfill an extensive and measurable access control modeling approach.  ... 
doi:10.5815/ijem.2011.02.09 fatcat:mjag4ql4bnfphlwcxx3raadzta

A Trust-Based Access Control Model for Pervasive Computing Applications [chapter]

Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray
2009 Lecture Notes in Computer Science  
Fine-grained access control is achieved depending on the trust levels of users. We develop a class of trust-based access control models having very formal semantics, expressed in graph theory.  ...  In this work, we propose a trust based approach for access control for pervasive computing systems. Our previously proposed belief based trust model is used to evaluate the trustworthiness of users.  ...  Introduction Traditional access control models like Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC) do not work well in pervasive computing systems  ... 
doi:10.1007/978-3-642-03007-9_22 fatcat:3rhqkn3jdjdc5c253nd53yaapu

Access Control in Internet of Things: A Survey

Yungpeng Zhang, Xuqing Wu
2017 DEStech Transactions on Engineering and Technology Research  
This paper focuses on building an access control model and system based on trust computing.  ...  This is a new field of access control techniques which includes Access Control, Trust Computing, Internet of Things, network attacks, and cheating technologies.  ...  The paper focuses on building an access control model and system based on trust computing, which is a new field of access control techniques that includes Access Control, Trust Computing, Internet of Things  ... 
doi:10.12783/dtetr/apetc2017/11295 fatcat:26nimozfpzbipbclbhiscdlbpa

TrustBAC

Sudip Chakraborty, Indrajit Ray
2006 Proceedings of the eleventh ACM symposium on Access control models and technologies - SACMAT '06  
In this work, we propose a trust based access control model called TrustBAC. It extends the conventional role based access control model with the notion of trust levels.  ...  The TrustBAC model thus incorporates the advantages of both the role based access control model and credential based access control models.  ...  The views presented here are solely that of the authors and do not necessarily represent those of the AFRL or the FAA. The authors would like to thank Mr. Robert Vaeth of the AFRL and Mr.  ... 
doi:10.1145/1133058.1133067 dblp:conf/sacmat/ChakrabortyR06 fatcat:uydn4fnr7nhg5kgek337d5trhu

Towards Robust and Effective Trust Management for Security: A Survey

Dongxia Wang, Tim Muller, Yang Liu, Jie Zhang
2014 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications  
There is a need for robust and effective trust management.  ...  In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems.  ...  , and partially supported by the A*STAR SERC grant (1224104047) awarded to Dr.  ... 
doi:10.1109/trustcom.2014.65 dblp:conf/trustcom/WangMLZ14 fatcat:mg6qxpymazew7eonimcgwwtvmm

A Framework for Flexible Access Control in Digital Library Systems [chapter]

Indrajit Ray, Sudip Chakraborty
2006 Lecture Notes in Computer Science  
These motivate us to propose a trust-based authorization model for digital libraries. Access privileges can be associated with both objects and content classes.  ...  a fine-grained access control.  ...  Different models exist for specifying access control policies like discretionary access control, mandatory access control and role-based access control.  ... 
doi:10.1007/11805588_18 fatcat:wfqy4hix75blxbmriwkwgzfyue

Dynamic access control

Prasad Naldurg, Roy H. Campbell
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We also explore the issues related to preserving safety properties and trust assumptions during this process.  ...  We investigate the cost of changing access control policies dynamically as a response action in computer network defense.  ...  ACKNOWLEDGMENTS The authors are grateful to Apu Kapadia, Geetanjali Sampemane, Seung Yi, Christopher Andrews and the anonymous reviewers for useful comments and suggestions.  ... 
doi:10.1145/775439.775442 fatcat:5edu6rwh7nhepee6hz47fhi6jy

Dynamic access control

Prasad Naldurg, Roy H. Campbell
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We also explore the issues related to preserving safety properties and trust assumptions during this process.  ...  We investigate the cost of changing access control policies dynamically as a response action in computer network defense.  ...  ACKNOWLEDGMENTS The authors are grateful to Apu Kapadia, Geetanjali Sampemane, Seung Yi, Christopher Andrews and the anonymous reviewers for useful comments and suggestions.  ... 
doi:10.1145/775412.775442 dblp:conf/sacmat/NaldurgC03 fatcat:l36cejsb2jhuljtmxpvwhp2swm

Engineering Trust Management into Software Models

Mark Reith, Jianwei Niu, William H. Winsborough
2007 International Workshop on Modeling in Software Engineering (MISE'07: ICSE Workshop 2007)  
One significant aspect of security involves access control. This paper proposes a multi-layer model detailing the integration of trust management access control with an application's model behavior.  ...  Our previous work focused on modeling the dynamic changes of a trust management policy for the purpose of verifying security properties using model checking.  ...  Various access control models have been studied including access control matrices and lists [8] , role-based [16, 17] , and logic-based [21] .  ... 
doi:10.1109/mise.2007.5 dblp:conf/icse/ReithNW07 fatcat:i5giijqpufafhp4l5otnuh3wai

A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing

Tao Huang, Zhiyong Zhang, Qingli Chen, Yanan Chang
2013 International Journal of Digital Content Technology and its Applications  
Based on cloud computing and remote certification, this paper proposed a usage control architecture and bidirectional integrality verification security protocol of multimedia digital contents in cloud  ...  DRM controller is set in cloud multimedia server by as a service, and user calls DRM controlling function through client GUI.  ...  to a large processor to a distributed task processing model based on network, and then to the recent cloud computing model based on demand.  ... 
doi:10.4156/jdcta.vol7.issue4.95 fatcat:zcua5f5is5cxtcppv7zfuziuqu

Role Performance Trust-Based Access Control for Protecting Sensitive Attributes

Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd. Sani, Hamidah Ibrahim
2016 International Journal of Security and Its Applications  
In this paper, we propose a new access control model based on trust called role performance trust-based access control to permit trusted user access to sensitive attributes.  ...  Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust.  ...  Propose a new access control model called role performance trust -based access control model (RPTBAC) to protect sensitive attributes. 2.  ... 
doi:10.14257/ijsia.2016.10.12.13 fatcat:55rkdww2nbajzc2vrw4ud3x75a

Security Policies in Distributed CSCW and Workflow Systems

Tanvir Ahmed, Anand R. Tripathi
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Research challenges of role based access control models for security policies in distributed CSCW and workflow systems are presented.  ...  In this paper, we have surveyed Computer-Supported Cooperative Work (CSCW) and workflow systems based on a time-line and have categorized the systems based on their emphasis on user or process interactions  ...  Based on this fact, later access control models have placed constraints on access control structures to facilitate analysis of safety properties, such as, Typed Access Matrix [40] .  ... 
doi:10.1109/tsmca.2010.2046727 fatcat:ysjm5nn5hjeehpfa7k3xbmja64
« Previous Showing results 1 — 15 out of 279,420 results