Integrating Dirichlet reputation into usage control

作者: Li Yang , Alma Cemerlic

DOI: 10.1145/1558607.1558679

关键词: Internet privacyContext (language use)Dirichlet distributionControl (management)Database transactionAuthenticationCloud computingComputer scienceComputer securityReputationAccess control

摘要: With new technology such as cloud computing emerging, parties communicate directly with each other to exchange files or execute transaction in a peer-to-peer fashion. Therefore, peers have manage the risks involved collaboration when prior experience and knowledge about are imcomplete. The behaviors of party undertain attributes party, requested objects, context information mutable. To address above changllenges, we integrate Dirichlet reputation into usage control authentication authorization collaborative enviornment. We added moving window mechanism evaluation. Moving windows not only help adjust our responsiveness system changes peers' behaviors, but also allow us use different strategies react group peers. Our offers way handle uncertainty mutability by dynamically revoke granted privileges from due low changed information.

参考文章(9)
Jean Bacon, Ken Moody, Walt Yao, A model of OASIS role-based access control and its support for active security ACM Transactions on Information and System Security. ,vol. 5, pp. 492- 540 ,(2002) , 10.1145/581271.581276
Jaehong Park, Ravi Sandhu, The UCON ABC usage control model ACM Transactions on Information and System Security. ,vol. 7, pp. 128- 174 ,(2004) , 10.1145/984334.984339
Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu, Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks intelligence and security informatics. pp. 75- 78 ,(2007) , 10.1109/ISI.2007.379537
Ravi Sandhu, Xinwen Zhang, Peer-to-peer access control architecture using trusted computing technology symposium on access control models and technologies. pp. 147- 158 ,(2005) , 10.1145/1063979.1064005
C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas, A quantitative trust establishment framework for reliable data packet delivery in MANETs Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. ,vol. 15, pp. 1- 10 ,(2005) , 10.1145/1102219.1102222
Nathan Dimmock, András Belokosztolszki, David Eyers, Jean Bacon, Ken Moody, Using trust and risk in role-based access control policies Proceedings of the ninth ACM symposium on Access control models and technologies - SACMAT '04. pp. 156- 162 ,(2004) , 10.1145/990036.990062
Li Xiong, Ling Liu, PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities IEEE Transactions on Knowledge and Data Engineering. ,vol. 16, pp. 843- 857 ,(2004) , 10.1109/TKDE.2004.1318566
V. Cahill, E. Gray, J.-M. Seigneur, C.D. Jensen, Yong Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo, C. Bryce, M. Carbone, K. Krukow, M. Nielsen, Using trust for secure collaboration in uncertain environments IEEE Pervasive Computing. ,vol. 2, pp. 52- 61 ,(2003) , 10.1109/MPRV.2003.1228527
Yanchao Zhang, Yuguang Fang, A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks IEEE Transactions on Parallel and Distributed Systems. ,vol. 18, pp. 1134- 1145 ,(2007) , 10.1109/TPDS.2007.1043