Skip to main content

Trust-Based Fuzzy Access Control Model Research

  • Conference paper
Web Information Systems and Mining (WISM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5854))

Included in the following conference series:

Abstract

Trust-based access control model uses the value of users’ static trust corresponding to the static attributes to get security of access control. However, facing the large number of users in the open system, the calculation of trust not only includes the static properties but also the context information with the ever-changing environment in the system. Using the fixed value to express the trust of the user to grant permissions without considering the dynamic context information may reduce the effectively of access control. Therefore, this paper proposes to use the fuzzy theory into the trust-based access control to solve the problem of dynamic access control by constructing reasonable structure with the fuzzy membership interval of the context information, along with establishing fuzzy rules for fuzzy inference.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R., Coyne, E., Feinstein, H.: Role-based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

  2. Ray, I., Chakraborty, S.: TrustBAC-Integrating Trust Relationships into the RBAC Model for Access Control in Open Sytems. In: SACMAT 2006, Lake Tahoe, California, USA, pp. 7–9 (2006)

    Google Scholar 

  3. Weiser, M.: The computer for the twenty-first century. Scientific American 265(3), 94–104 (1991)

    Article  Google Scholar 

  4. Sandhu, S.: The ARBAC 1997 Model for Role-Based Administration of Roles: Preliminary Description and Outline. In: Proceedings of the second ACM workshop on Role-based access control, November 1997, pp. 41–50 (1997)

    Google Scholar 

  5. Zhang, L., Wang, X.: Trustworthiness-based fuzzy adaptive access control model for pervasive computing. Application Research of Computers (1), 311–316 (2009)

    Google Scholar 

  6. Hilary, H.H.: Security is fuzzy: applying the fuzzy logic paradigm to the multipolicy paradigm. In: Proc. of the ACM Workshop on New Security Paradigms, pp. 175–184. ACM Press, New York (1993)

    Google Scholar 

  7. Janczewski, L.J., Portougal, V.: Need-to-know principle and fuzzy security clearances modeling. Information Management & Computer Security 8(5), 210–217 (2000)

    Article  Google Scholar 

  8. Chang, E., Thomson, P., Dillon, T., et al.: The fuzzy and dynamic nature of trust. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 161–174. Springer, Heidelberg (2005)

    Google Scholar 

  9. Charalampos, P., Karamolegkos, P., Voulodimos, A., et al.: Security and privacy in pervasive computing. IEEE Pervasive Computing 6(4), 73–75 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, R., Zhang, Y., He, Z., Fan, S. (2009). Trust-Based Fuzzy Access Control Model Research. In: Liu, W., Luo, X., Wang, F.L., Lei, J. (eds) Web Information Systems and Mining. WISM 2009. Lecture Notes in Computer Science, vol 5854. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05250-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05250-7_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05249-1

  • Online ISBN: 978-3-642-05250-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics