Analyzing Directed Acyclic Graph Recombination
Proceedings of the International Conference, 7th Fuzzy Days on Computational Intelligence, Theory and Applications
Logic-Based Reasoning on Delegatable Authorizations
ISMIS '02 Proceedings of the 13th International Symposium on Foundations of Intelligent Systems
Fast Access Control Decisions from Delegation Certificate Databases
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
On the Structure of Delegation Networks
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A representation model of trust relationships with delegation extensions
iTrust'05 Proceedings of the Third international conference on Trust Management
Graphical representation of authorization policies for weighted credentials
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation of the theoretical model weighted trust graph (WTG). A brief description of WTG Model and its associated tool is included in the text. In essence, the model is based on the inclusion of real numbers between zero and one in certificates to represent the trust level between the entities involved in them. This trust level is used to control delegation. Moreover, attributes from di_erent domains may be interrelated, so attribute delegation is also taken into account. The proposed Simulation Engine supports one directional and bidirectional search algorithms.