Validating a trust-based access control system

被引:0
作者
Adams, William J. [1 ]
Davis, Nathaniel J. [2 ]
机构
[1] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
[2] US Air Force, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
来源
TRUST MANAGEMENT | 2007年 / 238卷
关键词
validation testing; access control; trust management;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over the last few years researchers have recognized the need for adaptive access control mechanisms for dynamic collaborative environments. As a result, several mechanisms have been proposed and demonstrated in academic literature. Although these mechanisms have been verified to perform as advertised, few of them have been validated to work within an operational environment. Using a decentralized trust-based access control system of their own design, the authors validated their system using a narrative technique to develop a realistic operational scenario. They tested the system within the scenario and then applied a cost and a success metric to the results to determine the efficiency of their mechanism. The results show how the authors' narrative approach and success metric combine to provide more efficient and effective analysis of how an access control mechanisms will perform when used in an operational environment.
引用
收藏
页码:91 / +
页数:2
相关论文
共 50 条
[41]   An Access Control Method based on Scenario Trust [J].
Ma, Shunan ;
He, Jingsha ;
Shuai, Xunbo .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) :942-952
[42]   Trust-based Scheme for Alert Spreading in VANET [J].
Ltifi, Amel ;
Zouinkhi, Ahmed ;
Bouhlel, Mohamed Salim .
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 :282-289
[43]   A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System [J].
YANG Chang~ 1 ;
2. School of Computer .
WuhanUniversityJournalofNaturalSciences, 2006, (06) :1809-1813
[44]   Blockchain and trust-based clustering scheme for the IoV [J].
Ayed, Samiha ;
Hbaieb, Amal ;
Chaari, Lamia .
AD HOC NETWORKS, 2023, 142
[45]   The Study of the Trust-Role Based Access Control [J].
Gao Zhong-wen ;
Zhang Ming-sheng .
MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 :7042-7045
[46]   Research of Workflow Access Control Strategy based on Trust [J].
Ma, Rui ;
Xu, Linying ;
Gao, Pengxiang .
2014 11th Web Information System and Application Conference (WISA), 2014, :86-90
[47]   A trust degree based access control in grid environments [J].
Luo, Junzhou ;
Ni, Xudong ;
Yong, Jianming .
INFORMATION SCIENCES, 2009, 179 (15) :2618-2628
[48]   MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems [J].
Kim, Dae-Young ;
Alodadi, Nujood ;
Chen, Zhiyuan ;
Joshi, Karuna P. ;
Crainiceanu, Adina ;
Needham, Don .
2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, :54-64
[49]   Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm [J].
Bhise, Avdhut Suryakant ;
Latif, Patil M. Toushif .
TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, :87-97
[50]   Zero Trust-Based Mobile Network Security Architecture [J].
Liu, Yiliang ;
Su, Zhou ;
Peng, Haixia ;
Xiang, Yushan ;
Wang, Wei ;
Li, Ruidong .
IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) :82-88