2015
DOI: 10.1007/978-3-319-26148-5_45
|View full text |Cite
|
Sign up to set email alerts
|

Balancing Trust and Risk in Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…However, as will be seen from the subsequent discussion, there is no single accepted definition of what "concrete evidence" is. Trust can be calculated in several ways depending on the application context [71]. Examples include reputation models in which trust ratings from third parties are combined to give a trust rating; behavioural trust where trust is estimated based on a record of historical transaction.…”
Section: Risk and Trust In Caacmentioning
confidence: 99%
See 4 more Smart Citations
“…However, as will be seen from the subsequent discussion, there is no single accepted definition of what "concrete evidence" is. Trust can be calculated in several ways depending on the application context [71]. Examples include reputation models in which trust ratings from third parties are combined to give a trust rating; behavioural trust where trust is estimated based on a record of historical transaction.…”
Section: Risk and Trust In Caacmentioning
confidence: 99%
“…From an access control perspective, trust expresses the level of confidence the resource controller has in the user not misusing the resource(s) that she wants to access [71] and several trust-based CAAC methods have been proposed.…”
Section: Trust-based Caac a Well-known Definition Of Trust Is Given B...mentioning
confidence: 99%
See 3 more Smart Citations