2008
DOI: 10.1016/j.entcs.2007.12.026
|View full text |Cite
|
Sign up to set email alerts
|

A Trust- and Property-based Access Control Model

Abstract: In open and distributed property-based access control systems, access rights are granted because of presented certified properties. However, controlling agents base their access decisions not only on presented certified properties. Crucial factors are the correlations between certified properties, experiences and expectations concerning other participating agents, and the resulting trust modalities. This work identifies the essential correlations and demonstrates how they can be explicitly integrated in access… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…In an ACK mechanism, consultation of one party should know each other whether meet the requirements of a property, whichshould first meet each other corresponding ACK strategy of sensitive attribute.In [32], ACK target figure (TTG) strategy and trust agreement are employed to enhance the security in the process of negotiations. In [33], access control model based on trust and attributeis proposed to limit resource providers need to ask the requester properties and describe freedom to its attributes. Thus, trusted relationship is established between both sides.In [34], trust negotiation isin the form of hidden attribute credentials and access policies to minimum disclosed credentials and access policies, according to the need to implement different levels of privacy protection.…”
Section: Research On Reliable Fault-tolerant Mechanism For Big Dmentioning
confidence: 99%
“…In an ACK mechanism, consultation of one party should know each other whether meet the requirements of a property, whichshould first meet each other corresponding ACK strategy of sensitive attribute.In [32], ACK target figure (TTG) strategy and trust agreement are employed to enhance the security in the process of negotiations. In [33], access control model based on trust and attributeis proposed to limit resource providers need to ask the requester properties and describe freedom to its attributes. Thus, trusted relationship is established between both sides.In [34], trust negotiation isin the form of hidden attribute credentials and access policies to minimum disclosed credentials and access policies, according to the need to implement different levels of privacy protection.…”
Section: Research On Reliable Fault-tolerant Mechanism For Big Dmentioning
confidence: 99%
“…Although computational accounts of trust have some limitations, the ability to 'measure' or value trust is often central in many decision making processes. For instance, the computability of risk and trust is exploited in order to analyze and devise access-control mechanisms that take into account risk and trust (Biskup et al, 2008;Dimmock et al, 2005). Other approaches investigate how trust affects the risk of ICT-mediated interaction (Gefen et al, 2003;Ratnasingham, 1998;Braendeland & Stølen, 2004;Michalakopoulous & Fasli 2005).…”
Section: From Trust Decisions To Policiesmentioning
confidence: 99%