Validating a trust-based access control system

被引:0
作者
Adams, William J. [1 ]
Davis, Nathaniel J. [2 ]
机构
[1] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
[2] US Air Force, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
来源
TRUST MANAGEMENT | 2007年 / 238卷
关键词
validation testing; access control; trust management;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over the last few years researchers have recognized the need for adaptive access control mechanisms for dynamic collaborative environments. As a result, several mechanisms have been proposed and demonstrated in academic literature. Although these mechanisms have been verified to perform as advertised, few of them have been validated to work within an operational environment. Using a decentralized trust-based access control system of their own design, the authors validated their system using a narrative technique to develop a realistic operational scenario. They tested the system within the scenario and then applied a cost and a success metric to the results to determine the efficiency of their mechanism. The results show how the authors' narrative approach and success metric combine to provide more efficient and effective analysis of how an access control mechanisms will perform when used in an operational environment.
引用
收藏
页码:91 / +
页数:2
相关论文
共 50 条
  • [31] Trust based access control model for securing electronic healthcare system
    Singh, Ashish
    Chatterjee, Kakali
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4547 - 4565
  • [32] Trust based access control model for securing electronic healthcare system
    Ashish Singh
    Kakali Chatterjee
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4547 - 4565
  • [33] A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
    Zhang, Jiyu
    Wu, Kehe
    Yan, Ruomeng
    Tian, Zheng
    Sun, Yizhen
    Wu, Yuxi
    Guo, Yaogong
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 1211 - 1232
  • [34] Trust-based Context-aware Authentication System for Ubiquitous Systems
    Yaici, Malika
    Oussayah, Anis
    Takerrabet, Mohamed Ahmed
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 35 - 42
  • [35] An adaptive mutual trust based access control model for electronic healthcare system
    Singh, Ashish
    Chatterjee, Kakali
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 2117 - 2136
  • [36] CloudFile: A cloud data access control system based on mobile social trust
    Yan, Zheng
    Shi, Wangyang
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 86 : 46 - 58
  • [37] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    [J]. 2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [38] An adaptive mutual trust based access control model for electronic healthcare system
    Ashish Singh
    Kakali Chatterjee
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 2117 - 2136
  • [39] Dynamic Game Access Control based on Trust
    Ma, Shunan
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1369 - 1373
  • [40] An Access Control Method based on Scenario Trust
    Shunan Ma
    Jingsha He
    Xunbo Shuai
    [J]. International Journal of Computational Intelligence Systems, 2012, 5 : 942 - 952