Modeling Role-based Trust and Authority in Open Environments

نویسنده

  • Dongwan Shin
چکیده

Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents a role-based approach to modeling trust and authority for open and distributed computing environments. Specifically, our approach centers on the extension of role-based capability delegation from local domains to trusted domains. A formal specification based on the fixpoint semantics is presented in order to better understand and design a distributed access control mechanism that can be built on

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GTrust: a group based trust model

Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...

متن کامل

DISARM: A Social Distributed Agent Reputation Model based on Defeasible Logic

Intelligent Agents act in open and thus risky environments, hence making the appropriate decision about who to trust in order to interact with, could be a challenging process. As intelligent agents are gradually enriched with Semantic Web technology, acting on behalf of their users with limited or no human intervention, their ability to perform assigned tasks is scrutinized. Hence, trust and re...

متن کامل

XML-based Trust Management in MAS

—This work deals with trust management in open and decentralized agent-based environments. Analysis and solutions are geared towards peer to peer networks, intended not just as a technology, but above all as a web of trust relationships, where parties interoperate directly, without reliance on any centralized directory or authority.

متن کامل

Trust Evaluation Scheme for Cloud Data Security using Fuzzy based Approach

Cloud computing provides a services for sharing and storing the data. Both cloud server and trusted authority are semitrusted party. The generation of trust value for cloud server and trust authority is a tedious process. Many researchers proposed different methods for generating trust value and it is still in open research. So, we propose a trust evaluation scheme for cloud data security using...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006