Access control for large collections
ACM Transactions on Information Systems (TOIS)
IEEE ADL '97 Proceedings of the IEEE international forum on Research and technology advances in digital libraries
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
Ma X: An Access Control System for Digital Libraries and the Web
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
A trust negotiation system for digital library Web services
International Journal on Digital Libraries
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
VTrust: a trust management system based on a vector model of trust
ICISS'05 Proceedings of the First international conference on Information Systems Security
A graph-based formalism for controlling access to a digital library ontology
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Hi-index | 0.00 |
Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not completely known in advance. In addition, the objects stored in a digital library are characterized by fine-grained behavioral interfaces and highly-contextualized access restrictions that require a user's access privileges to be updated dynamically. These motivate us to propose a trust-based authorization model for digital libraries. Access privileges can be associated with both objects and content classes. Trust levels associated with these specify the minimum acceptable level of trust needed of a user to allow access to the objects. We use a vector trust model to calculate the system's trust about a user. The model uses a number of different types of information about a user, for example, prior usage history, credentials, recommendations etc., to calculate the trust level in a dynamic manner and thus achieve a fine-grained access control.