test
server time: root: http://itiis.org
current_path: /journals/tiis/digital-library/20040
current_url: http://itiis.org/journals/tiis/digital-library/20040
Trust and Risk based Access Control and Access Control Constraints
  • KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Trust and Risk based Access Control and Access Control Constraints

Vol. 5, No. 11, November 28, 2011
10.3837/tiis.2011.11.022, Download Paper (Free):

Abstract

Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
N. Helil, M. Kim and S. Han, "Trust and Risk based Access Control and Access Control Constraints," KSII Transactions on Internet and Information Systems, vol. 5, no. 11, pp. 2254-2271, 2011. DOI: 10.3837/tiis.2011.11.022.

[ACM Style]
Nurmamat Helil, Mucheol Kim, and Sangyong Han. 2011. Trust and Risk based Access Control and Access Control Constraints. KSII Transactions on Internet and Information Systems, 5, 11, (2011), 2254-2271. DOI: 10.3837/tiis.2011.11.022.