2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems 2005
DOI: 10.1109/mtas.2005.244173
|View full text |Cite
|
Sign up to set email alerts
|

An Access Control Model for Ubiquitous Computing Application

Abstract: Traditional computer system depends on access policy and user's identities to grant or deny their access to resources. The basic assumption in this system is the entities had been known. It is unsuitable to use identitybased access control in ubiquitous computing environment where entities are not foreknown to each other. In this paper, we present a trust based access control model to secure ubiquitous computing application. The resourceconstrained trust negotiation is addressed to establish initial trust for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 16 publications
(14 reference statements)
0
7
0
Order By: Relevance
“…They define trust as the level of confidence associated with a user based on certain certified attributes. Jameel et al [21] provides a trust model based on the vectors of trust values of different entities. The trust evaluation depends only on the recommendation of peer common entities to the interacting entities.…”
Section: Related Workmentioning
confidence: 99%
“…They define trust as the level of confidence associated with a user based on certain certified attributes. Jameel et al [21] provides a trust model based on the vectors of trust values of different entities. The trust evaluation depends only on the recommendation of peer common entities to the interacting entities.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, these models do not allow access control decisions to be dynamically updated or revoked based on the history of the requester, or based on changing requirements of the requester. Recently, researchers have proposed the notion of risk-adaptable access control models [9,14,13] and trust-based access control models [7,4,23] to facilitate dynamic adaptation of access control policies based on operational needs and situational awareness. A recent work [1] combines these two philosophies into one comprehensive model.…”
Section: Related Workmentioning
confidence: 99%
“…Centaurus depends heavily on the delegation of trust to third party. Recent research trend [4][5][6][7][8][9][10][11][12][13][17][18][19][20][21][22][23][24][25][26][27][28] is to build autonomous trust management as fundamental building block to design future security framework. SECURE project [4,5] presents a formal trust and risk framework to secure collaboration between ubiquitous computer systems.…”
Section: Related Workmentioning
confidence: 99%
“…They used expected value, entropy and hyper entropy to define a trust cloud representing trust relationship. Ya-Jun et al [8] have presented a trust-based access control model that relies on trust negotiation to establish initial trust for authenticating strangers. It is an extension of the role based access control thus suffers with its inherent issues.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation