Access control for large collections
ACM Transactions on Information Systems (TOIS)
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Trust-based Context-Aware Access Control Model for Web-Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Adjustable Trust Model for Access Control
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
BusiROLE: A Model for Integrating Business Roles into Identity Management
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
Journal of Network and Computer Applications
ATM: an automatic trust monitoring algorithm for service software
Proceedings of the 2009 ACM symposium on Applied Computing
Towards trusted intelligence information sharing
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Methods for Computing Trust and Reputation While Preserving Privacy
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A Trust-Based Access Control Model for Pervasive Computing Applications
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Towards Trustworthy Delegation in Role-Based Access Control Model
ISC '09 Proceedings of the 12th International Conference on Information Security
Research of Reliability-Based Four Layers Access Control Model
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Trusted resource dissemination in Internetware systems
Proceedings of the First Asia-Pacific Symposium on Internetware
Trust-Based Fuzzy Access Control Model Research
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Sharing reputation across virtual communities
Journal of Theoretical and Applied Electronic Commerce Research
Intra-role progression in RBAC: an RPG-Like access control scheme
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
A trust-and-risk aware RBAC framework: tackling insider threat
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Computers & Mathematics with Applications
Security and Communication Networks
Modeling access control for cyber-physical systems using reputation
Computers and Electrical Engineering
A trust and context aware access control model for web services conversations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
A model for trust-based access control and delegation in mobile clouds
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Future Generation Computer Systems
Science of Computer Programming
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
Hi-index | 0.00 |
Conventional access control are suitable for regulating access to resources by known users.However,these models have often found to be inadequate for open and decentralized multi-centric systems where the user population is dynamic and the identity of all users are not known in advance.For such systems, credential based access control has been proposed. Credential based systems achieve access control by implementing a binary notion of trust.If a user is trusted by virtue of successful evaluation of its credentials it is allowed access, otherwise not. However,such credential based models have also been found to be lacking because of certain inherent drawbacks with the notion of credentials.In this work,we propose a trust based access control model called TrustBAC. It extends the conventional role based access control model with the notion of trust levels.Users are assigned to trust levels instead of roles based on a number of factors like user credentials,user behavior history,user recommendation etc. Trust levels are assigned to roles which are assigned to permissions as in role based access control.The TrustBAC model thus incorporates the advantages of both the role based access control model and credential based access control models.