2005
DOI: 10.1007/11429760_25
|View full text |Cite
|
Sign up to set email alerts
|

Risk Models for Trust-Based Access Control(TBAC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…Risk-based access control [1], [8], [11], [12], [14], [27], [33] has recently been proposed as a mechanism for providing flexible authorization in complex and unpredictable environments. The key idea is to maximize productivity while bounding risk instead of eliminating risk.…”
Section: Related Workmentioning
confidence: 99%
“…Risk-based access control [1], [8], [11], [12], [14], [27], [33] has recently been proposed as a mechanism for providing flexible authorization in complex and unpredictable environments. The key idea is to maximize productivity while bounding risk instead of eliminating risk.…”
Section: Related Workmentioning
confidence: 99%
“…However, service providers are exposed to requestors scattered across multiple organizational domains, so can be exploited by untrustworthy requestors while providing services [1]. 1 Given that, provider software need to SOCA (2009 automatically decide on which entity they should trust for service collaboration [2].…”
Section: Introductionmentioning
confidence: 99%
“…Some recent research used trust as the fundamental component [2,3,4]. Some combine trust with risk to create a stronger security service to support peer-topeer environment [4,9].…”
Section: Introductionmentioning
confidence: 99%