2012 9th International ISC Conference on Information Security and Cryptology 2012
DOI: 10.1109/iscisc.2012.6408204
|View full text |Cite
|
Sign up to set email alerts
|

A trust and reputation-based access control model for virtual organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 12 publications
0
2
0
1
Order By: Relevance
“…Comprising the value representation, seventeen articles presented the trust or reputation value in continuous format, that is, included in a predefined range [8,17], while only two works presented the binary method, and one article was not identified (NI) [2]. The binary format is used in PathTrust [7] to represent feedback, which can be positive or negative, and in Arasteh et al [24] trust value under binary is used in the access control.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Comprising the value representation, seventeen articles presented the trust or reputation value in continuous format, that is, included in a predefined range [8,17], while only two works presented the binary method, and one article was not identified (NI) [2]. The binary format is used in PathTrust [7] to represent feedback, which can be positive or negative, and in Arasteh et al [24] trust value under binary is used in the access control.…”
Section: Resultsmentioning
confidence: 99%
“…Through the analyzed articles in the systematic review [2,4,5,7,8,11,[17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32], and the review articles [1,6,[13][14][15]33] that presented classification characteristics for reputation and trust system in general, a taxonomy was designed to classify and compare the works that are applied in Virtual Organization's context.…”
Section: The Proposed Taxonomymentioning
confidence: 99%
“…A confiança também auxilia no controle de acesso a recursos computacionais ou informações em que os mecanismos tradicionais de controle de acesso não são empregados, devido à dinamicidade da OV e a interação com usuários desconhecidos [39]. Weng et al [40] empregam o conceito de confiança na troca de arquivos confidenciais e destacam que o relacionamento de confiança entre os parceiros é a base para a colaboração.…”
Section: Organizações Virtuais E Confiançaunclassified
“…For this reason, it becomes necessary to find a way to define trust. Trust cannot be directly mapped into the analytical world due to its subjective nature, but it can be generated using an element that generates measurable trust which is "Reputation" [101] [102]. Based on the reputation that a trustee have about doing a set of tasks, that trustee will generate a level of trust.…”
Section: Trust In Multi-stakeholder Scenariosmentioning
confidence: 99%
“…N.Lo et al [104] focuse on a two module-based system to manage the resources allocation in a multi-cloud scenario in which the multiple cloud managers are aware of the actions done regarding their resources. M.Arasteh et al [102] designed an access control model for the resources owners to participate together in a single virtual organization. While both works [102][104] focus on a multi-provider scenario, the solution they presented follows a centralized design (i.e., with a single element on top) which centralizes the whole process and so, it may lead to the possibility of becoming a bottleneck and cause a central point of failure situation that some entity might gain advantage over.…”
Section: Trust In Multi-stakeholder Scenariosmentioning
confidence: 99%