Validating a trust-based access control system

被引:0
作者
Adams, William J. [1 ]
Davis, Nathaniel J. [2 ]
机构
[1] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
[2] US Air Force, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
来源
TRUST MANAGEMENT | 2007年 / 238卷
关键词
validation testing; access control; trust management;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over the last few years researchers have recognized the need for adaptive access control mechanisms for dynamic collaborative environments. As a result, several mechanisms have been proposed and demonstrated in academic literature. Although these mechanisms have been verified to perform as advertised, few of them have been validated to work within an operational environment. Using a decentralized trust-based access control system of their own design, the authors validated their system using a narrative technique to develop a realistic operational scenario. They tested the system within the scenario and then applied a cost and a success metric to the results to determine the efficiency of their mechanism. The results show how the authors' narrative approach and success metric combine to provide more efficient and effective analysis of how an access control mechanisms will perform when used in an operational environment.
引用
收藏
页码:91 / +
页数:2
相关论文
共 50 条
  • [1] Trust-Based Access Control for Collaborative System
    Liu, Yichun
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 444 - 448
  • [2] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 765 - 768
  • [3] TAPS: Trust-based Access Control and Protect System
    Yoo, Yoon-Sik
    Lee, Hyungkyu
    Jung, Boo-Geum
    Park, HeaSook
    Kim, Kiwon
    Park, Cheong Hee
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 71 - 75
  • [4] Toward a decentralized trust-based access control system for dynamic collaboration
    Adams, WJ
    Davis, NJ
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324
  • [5] Formal Description of Trust-based Access control
    Ma Xiaoning
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 383 - 385
  • [6] Formal Description of Trust-based Access control
    Ma Xiaoning
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 555 - 560
  • [7] Trust-based access control for collaborative systems
    Bedi, Punam
    Kaur, Harmeet
    Gupta, Bhavna
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2014, 26 (01) : 109 - 126
  • [8] Trust-based access control model for grid applications
    Yao, Hanbing
    Liu, Yangjun
    Liu, Wei
    Li, Ruixuan
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 491 - 495
  • [9] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [10] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203