A Trust-Based Access Control Model for Pervasive Computing Applications

  • Authors:
  • Manachai Toahchoodee;Ramadan Abdunabi;Indrakshi Ray;Indrajit Ray

  • Affiliations:
  • Department of Computer Science, Colorado State University, Fort Collins 80523-1873;Department of Computer Science, Colorado State University, Fort Collins 80523-1873;Department of Computer Science, Colorado State University, Fort Collins 80523-1873;Department of Computer Science, Colorado State University, Fort Collins 80523-1873

  • Venue:
  • Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. In this work, we propose a trust based approach for access control for pervasive computing systems. Our previously proposed belief based trust model is used to evaluate the trustworthiness of users. Fine-grained access control is achieved depending on the trust levels of users. We develop a class of trust-based access control models having very formal semantics, expressed in graph theory. The models differ with respect to the features they provide, and the types of the trust constraints that they can support.