2011
DOI: 10.5121/ijcnc.2011.3309
|View full text |Cite
|
Sign up to set email alerts
|

Extending Resource Access in Multi-Provider Networks Using Trust Management

Abstract: Resource access control in a multi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Trust management is a broadly investigated topic for collaborative systems in the information technology area, e.g., peer-to-peer networks [9], intrusion detection networks [10] and multi-agent systems in e-market [11]. In the communication technology area, the most noteworthy research works regard the access control and trust management in multi-domain networks [12], [13] considering also the PCE architecture [14], [15]. However, the aforementioned works are mainly focused on authorization mechanisms and on regulating the grant of access rights.…”
Section: Introductionmentioning
confidence: 99%
“…Trust management is a broadly investigated topic for collaborative systems in the information technology area, e.g., peer-to-peer networks [9], intrusion detection networks [10] and multi-agent systems in e-market [11]. In the communication technology area, the most noteworthy research works regard the access control and trust management in multi-domain networks [12], [13] considering also the PCE architecture [14], [15]. However, the aforementioned works are mainly focused on authorization mechanisms and on regulating the grant of access rights.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, it allows policy makers to express conditions that control the usage of resources, i.e., these conditions are continuously evaluated all along the access time, so that an access right can be revoked as soon as they are violated. The PolPA authorization system has been successfully adopted in several scenarios, such as the grid (Martinelli and Mori 2010), mobile devices (Castrucci et al 2008), and next-generation networks (Colombo et al 2011).…”
Section: Introductionmentioning
confidence: 99%