Role-Based Access Control Models
Computer
The ARBAC97 model for role-based administration of roles: preliminary description and outline
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Security and Privacy in Pervasive Computing
IEEE Pervasive Computing
The fuzzy and dynamic nature of trust
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Fuzzy Role-Based Access Control
Information Processing Letters
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Trust-based access control model uses the value of users' static trust corresponding to the static attributes to get security of access control. However, facing the large number of users in the open system, the calculation of trust not only includes the static properties but also the context information with the ever-changing environment in the system. Using the fixed value to express the trust of the user to grant permissions without considering the dynamic context information may reduce the effectively of access control. Therefore, this paper proposes to use the fuzzy theory into the trust-based access control to solve the problem of dynamic access control by constructing reasonable structure with the fuzzy membership interval of the context information, along with establishing fuzzy rules for fuzzy inference.