Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Authorization Based on Evidence and Trust
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
How much is "enough"? Risk in Trust-Based Access Control
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Fidelis: a policy-driven trust management framework
iTrust'03 Proceedings of the 1st international conference on Trust management
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Component based trust management in the context of a virtual organization
Proceedings of the 2005 ACM symposium on Applied computing
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
Risky trust: risk-based analysis of software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
A Monte Carlo framework to evaluate context based security policies in pervasive mobile environments
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
A trust based approach for protecting user data in social networks
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
UMLtrust: towards developing trust-aware software
Proceedings of the 2008 ACM symposium on Applied computing
CAT: a context-aware trust model for open and dynamic systems
Proceedings of the 2008 ACM symposium on Applied computing
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Using web service enhancements to bridge business trust relationships
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
ATM: an automatic trust monitoring algorithm for service software
Proceedings of the 2009 ACM symposium on Applied Computing
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Integrating Dirichlet reputation into usage control
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Trading in risk: using markets to improve access control
Proceedings of the 2008 workshop on New security paradigms
ASITL: adaptive secure interoperation using trust-level
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Managing risks in RBAC employed distributed environments
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Dynamic access control research for inter-operation in multi-domain environment based on risk
WISA'07 Proceedings of the 8th international conference on Information security applications
Trust and privacy in attribute based access control for collaboration environments
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
A calculus for the qualitative risk assessment of policy override authorization
Proceedings of the 3rd international conference on Security of information and networks
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
A risk-aware resource service decision strategy for global computing
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
RAR: A role-and-risk based flexible framework for secure collaboration
Future Generation Computer Systems
A risk-based evaluation of group access control approaches in a healthcare setting
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Influence of attribute freshness on decision making in usage control
STM'10 Proceedings of the 6th international conference on Security and trust management
Risk models for trust-based access Control(TBAC)
iTrust'05 Proceedings of the Third international conference on Trust Management
Security analysis and validation for access control in multi-domain environment based on risk
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Graceful privilege reduction in RFID security
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
A policy-based decentralized authorization management framework for cloud computing
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A trust-and-risk aware RBAC framework: tackling insider threat
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Visualization control for event-based public display systems used in a hospital setting
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Risk-Aware role-based access control
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Insured access: an approach to ad-hoc information sharing for virtual organizations
Proceedings of the third ACM conference on Data and application security and privacy
Implementing graceful RFID privilege reduction
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Enforcement of entailment constraints in distributed service-based business processes
Information and Software Technology
Future Generation Computer Systems
Automatic security assessment for next generation wireless mobile networks
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their credentials and intentions. Most distributed access control architectures have far more rigid policy rules, yet in many respects aim to solve a similar problem. This paper elucidates the similarities between trust management and distributed access control systems by demonstrating how the OASIS access control system and its rôle-based policy language can be extended to make decisions on the basis of trust and risk analyses rather than on the basis of credentials alone. We apply our new model to the prototypical example of a file storage and publication service for the Grid, and test it using our Prolog-based OASIS implementation.