2005
DOI: 10.1007/11414360_22
|View full text |Cite
|
Sign up to set email alerts
|

TrustAC: Trust-Based Access Control for Pervasive Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 5 publications
0
21
0
1
Order By: Relevance
“…3 we can also see that for making authorization decision SAML is based on XACML [16], which has not been implemented yet. We have our own XACML-compliant authorization system [1], which has been successfully deployed and extended for taking into account trust information in the access control policies. So we are going to integrate our SP with such system to grant or to deny permissions.…”
Section: Implementation Issuesmentioning
confidence: 99%
“…3 we can also see that for making authorization decision SAML is based on XACML [16], which has not been implemented yet. We have our own XACML-compliant authorization system [1], which has been successfully deployed and extended for taking into account trust information in the access control policies. So we are going to integrate our SP with such system to grant or to deny permissions.…”
Section: Implementation Issuesmentioning
confidence: 99%
“…They assume a TTP such as a security server to be available on-line. Many new trust models have been proposed to handle disconnected modes situations [8], such as reputation-based trust management systems [6] [7]. Yet, there is no real agreement on an adequate and realistic model of trust.…”
Section: Related Workmentioning
confidence: 99%
“…When computing trustworthiness using the indirect approach, PTM assigns weights to the trust values reported by the recommenders which reflect the reliability of the sources. Almenarez et al also present TrustAC [3], which defines access control policies based on trust values obtained from PTM.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Almenarez et al's TrustAC [3] and Saadi et al's Chameleon [22] are some of the several access control models that have been proposed for pervasive environments. Most of these models augment established access control approaches with trust elements.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation