Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.58
|View full text |Cite
|
Sign up to set email alerts
|

A Trust based Access Control Framework for P2P File-Sharing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…However, as the collaboration spaces interconnect to form a distributed network, access control techniques are being more fine-grained and hierarchical. Catering to diverse network environments, different models like Trust Based Access Control [5], Attribute Based Access Control [6] and Task Based Access Control [7] have been widely used.…”
Section: A Access Controlmentioning
confidence: 99%
“…However, as the collaboration spaces interconnect to form a distributed network, access control techniques are being more fine-grained and hierarchical. Catering to diverse network environments, different models like Trust Based Access Control [5], Attribute Based Access Control [6] and Task Based Access Control [7] have been widely used.…”
Section: A Access Controlmentioning
confidence: 99%
“…In order to better cater for use case scenarios that involve data sharing across various distributed data stores underpinning decentralized applications, there is a need for tools and technologies that are not only capable of working with distributed data but are also able to manage data resources that come with a variety of usage terms and conditions specified by data producers. However, the vast majority of decentralized web initiatives, which aim to provide users with a greater degree of control over personal resources, manage data access via simple access control mechanisms (Tran et al, 2005;Toninelli et al, 2006;Ouaddah et al, 2016) that are not able to verify that usage conditions are adhered to after access has been granted (Akaichi and Kirrane, 2022b). For example, access control rules can determine if users can retrieve data or not.…”
Section: Introductionmentioning
confidence: 99%
“…To answer this main research question, we analyze the requirements for a dApp control framework and conclude that control architecture and governance architecture are responsible for meeting decentralized requirements. In addition, coordination of decentralized control actions, including significant aspects of the consensus between peers and how to incentive collaboration between different peers, need to be investigated [14,15].…”
Section: Introductionmentioning
confidence: 99%