scholarly journals A Smart Card Solution for Access Control and Trust Management for Nomadic Users

Author(s):  
Daniel Díaz Sánchez ◽  
Andrés Marín Lopez ◽  
Florina Almenárez Mendoza
2018 ◽  
Vol 7 (4.6) ◽  
pp. 49
Author(s):  
Rajanikanth Aluvalu ◽  
Krishna Keerthi Chennam ◽  
M. A.Jabbar ◽  
Shaik Sarfaraz Ahamed

Secure interactions between collaborative organizations having their applications and data stored in “Cloud Computing” are a critical issue. Access control is the biggest challenge and trust is regarded as an essential secured relationship within a distributed system. Basic access control models, like Discretionary Access Control, Mandatory Access Control, and Role Based Access Control, cannot satisfy requirements in such environment, and need some improvements. During the collaboration, the attitude of the user may change. Therefore, in this context, adding trust management to an access control model is mandatory. To achieve this goal, in this paper, a new trust model to control access in the cloud is proposed. The aim is to monitor in real-time security for collaborative organizations, having decided to migrate to the cloud.  


2011 ◽  
Vol 403-408 ◽  
pp. 2176-2179
Author(s):  
Xiu Hua Geng ◽  
Xiao Lei Zhang

Trust management is a distributed access control mechanism for open, large-scale network. SPKI/SDSI and RT0 are typical trust management systems. This paper compares the different crendentials in those systems essentially, and the result shows that although RT0 crendentials are relatively simple, they are expressively eauivalent to SPKI/SDSI crendentials.


Author(s):  
Poonam N. Railkar ◽  
◽  
Parikshit Mahalle ◽  
Dr. Gitanjali Rahul Shinde ◽  
◽  
...  

IoT is a network of interconnected heterogeneous devices which sense, accumulate the data and forward the same to the cloud platform for analytical purposes. There are various IoT verticals in which huge research is going on. IoT security is the most challenging research area in which researchers are investing a huge number of efforts. The challenges in IoT security include access control, trust management, authentication, authorization, privacy, and secured device to device communication. To overcome these, this paper gives an overview of proposed trust based distributed access control approach in IoT. Some of the challenges and threats can be controlled by blockchain technology. Basically, blockchain is an open and distributed ledger of records that can be verified efficiently and stored permanently. This paper checks the feasibility study of the applicability of blockchain in the IoT ecosystem to apply access control mechanism and privacy-preserving policies. This paper discusses how access control and privacy can be addressed by blockchain without compromising security. This paper consists of rigorous gap analysis which is done on the top of comprehensive literature survey. The paper also addresses the challenges and issues which can be faced while applying access control mechanism using blockchain in the context of IoT.


Author(s):  
Li Yang ◽  
Chang Phuong ◽  
Amy Novobilski ◽  
Raimund K. Ege

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.


Sign in / Sign up

Export Citation Format

Share Document