Skip to main content

Trust Value of the Role Access Control Model Based on Trust

  • Conference paper
  • 1198 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 355))

Abstract

In order to solve the current situation that the trust computation of access control model based on trust is insufficient to conduct a fine-grained and dynamic access control, the access control (role model RACT access control model based on trust) which is a fine-grained and integrated with the context is built. The trust value and the threshold of activation and decision tree algorithm are added into RACT to improve the single trust value algorithm for multiple algorithms and realize dynamic access control which is combined with the session history. Experiments show that RACT has higher security than the existing trust model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bleckmann DM, Starnes WW, Andersen BD. Method to control access between network endpoints based on trust scores calculated from information system component analysis: U.S. Patent 8,429,412. 2013-4-23.

    Google Scholar 

  2. Li Q, Zhang X, Xu M, et al. Towards secure dynamic collaborations with group-based RBAC model. Comput Security. 2009;28(5):260–75.

    Article  Google Scholar 

  3. Duan J, Gao D, Foh CH, et al. TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw. 2013;11(8):2675–92.

    Article  Google Scholar 

  4. Le XH, Doll T, Barbosu M, et al. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J Biomed Inform. 2012;45(6):1084–107.

    Article  Google Scholar 

  5. Ma X, Li R, Lu Z, et al. Mining constraints in role-based access control. Math Comput Model. 2012;55(1):87–96.

    Article  Google Scholar 

  6. Zhong R, Sumalee A, Maruyama T. Dynamic marginal cost, access control, and pollution charge: a comparison of bottleneck and whole link models. J Adv Transp. 2012;46(3):191–221.

    Article  Google Scholar 

  7. Joshi JB, Bertino E, Latif U, et al. A generalized temporal role-based access control model. Knowl Eng IEEE Trans. 2005;17(1):4–23.

    Article  Google Scholar 

  8. Goyal V, Pandey O, Sahai A et al. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006: 89–98.

    Google Scholar 

  9. Roesner F, Kohno T, Moshchuk A et al. User-driven access control: rethinking permission granting in modern operating systems. Security and Privacy (SP), 2012 I.E. Symposium on. IEEE, 2012: 224–238.

    Google Scholar 

  10. Park J, Sandhu R, Cheng Y. A user-activity-centric framework for access control in online social networks. Internet Comput IEEE. 2011;15(5):62–5.

    Article  Google Scholar 

  11. Ferraiolo DF, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control. ACM Trans Inform Syst Security (TISSEC). 2001;4(3):224–74.

    Article  Google Scholar 

Download references

Acknowledgments

As the research of the thesis is sponsored by National Natural Science Foundation of China (No: 61262075) and major scientific research project of Guangxi Higher Education (No: 201201ZD012), we would like to extend our sincere gratitude to them.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Cheng, X., Wang, T. (2015). Trust Value of the Role Access Control Model Based on Trust. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11104-9_21

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11103-2

  • Online ISBN: 978-3-319-11104-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics