Modeling Role-based Trust and Authority in Open Environments
نویسنده
چکیده
Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents a role-based approach to modeling trust and authority for open and distributed computing environments. Specifically, our approach centers on the extension of role-based capability delegation from local domains to trusted domains. A formal specification based on the fixpoint semantics is presented in order to better understand and design a distributed access control mechanism that can be built on
منابع مشابه
GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملDISARM: A Social Distributed Agent Reputation Model based on Defeasible Logic
Intelligent Agents act in open and thus risky environments, hence making the appropriate decision about who to trust in order to interact with, could be a challenging process. As intelligent agents are gradually enriched with Semantic Web technology, acting on behalf of their users with limited or no human intervention, their ability to perform assigned tasks is scrutinized. Hence, trust and re...
متن کاملXML-based Trust Management in MAS
—This work deals with trust management in open and decentralized agent-based environments. Analysis and solutions are geared towards peer to peer networks, intended not just as a technology, but above all as a web of trust relationships, where parties interoperate directly, without reliance on any centralized directory or authority.
متن کاملTrust Evaluation Scheme for Cloud Data Security using Fuzzy based Approach
Cloud computing provides a services for sharing and storing the data. Both cloud server and trusted authority are semitrusted party. The generation of trust value for cloud server and trust authority is a tedious process. Many researchers proposed different methods for generating trust value and it is still in open research. So, we propose a trust evaluation scheme for cloud data security using...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل