PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Two Extensions of Trust Management Languages

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This article is focused on the family of role-based trust management languages (RT). Trust management languages are a useful method of representing security credentials and policies in large distributed access control mechanisms. They provide sets of credentials that are assigned to individual roles performed by the specific entities. These credentials provide relevant information about security policies issued by trusted authorities and define user permissions. RT languages describe the individual entities and the roles that these entities play in a given environment. A set of credentials representing a given security policy defines which entity has the necessary rights to access a specific resource and which entity does not have such rights. This study presents the results of research focusing on the potential of the family of RT languages. Its purpose is to show how security policies may be applied more widely by applying an inference system, and then using the extensions of the credentials, by taking into account time-related information or the conditions imposed with regard to the validity of such credentials. Each of these extensions can be used jointly or separately, offering even a wider range of opportunities.
Rocznik
Tom
Strony
87--94
Opis fizyczny
Bibliogr. 12 poz.
Twórcy
autor
  • Information Security Methods Team, Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland
Bibliografia
  • [1] X. Qian and T. F. Lunt, "A MAC policy framework for multilevel relational databases", IEEE Trans. Knowl. and Data Engin., vol. 8, no. 1, pp. 3-15, 1996 (doi: 10.1109/69.485625).
  • [2] National Computer Security Center, „A guide to understanding discretionary access control in trusted systems", NCSC-TG-003, 1987 [Online]. Available: https://fas.org/irp/nsa/rainbow/tg003.htm
  • [3] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models", IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996 (doi: 10.1109/2.485845).
  • [4] M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management", in Proc. 17th IEEE Symp. on Secur. and Priv., Oakland, CA, USA, 1996, pp. 164-173 (doi: 10.1109/SECPRI.1996.502679).
  • [5] N. Li, W. Winsborough, and J. Mitchell, "Distributed credential chain discovery in trust management", J. Comput. Secur., vol. 11, no. 1, pp. 35-86, 2003 (doi: 10.1145/502001.502005).
  • [6] N. Li, J. Mitchell, and W. Winsborough, "Design of a role-based trust-management framework", in Proc. IEEE Symp. on Secur. And Priv., Berkeley, CA, USA, 2001, pp. 114-130 (doi: 10.1109/SECPRI.2002.1004366).
  • [7] S. Chithra, "A role based trust model for peer to peer systems using credential trees", Int. J. of Comp. Theory and Engin., vol. 3, no. 2, pp. 234-239, 2011 (doi: 10.7763/IJCTE.2011.V3.310).
  • [8] A. Felkner, "How the role-based trust management can be applied to wireless sensor networks", J. of Telecommun. and Inform. Technol., no. 4, 2012, pp. 70-77 [Online]. Available: http://dlibra.itl.waw.pl/dlibra-webapp/dlibra/docmetadata?id=1570
  • [9] K. Ezhil Vignesh and N. Radhika, "An improved role based trust management system using interactive articial bee colony (I-ABC) algorithm for wireless sensor networks", Res. J. of Appl. Sci. Engin. and Technol., vol. 10, no. 10, pp. 1175-1184, 2015 (doi: 10.19026/rjaset.10.1885).
  • [10] Pratap Kumar Behera, "A Novel Trust Based Access Control Model for Cloud Environment", M.Tech. Thesis, Department of Computer Science and Engineering National Institute of Technology Rourkela, Rourkela, India, 2015 [Online]. Available: https://core.ac.uk/download/pdf/80147859.pdf
  • [11] D. Gorla, M. Hennessy, and V. Sassone, "Inferring dynamic credentials for role-based trust management", in Proc. of the 8th Conf. on Princip. and Pract. of Declar. Programm. ACM SIGPLAN 2006, Venice, Italy, 2006, pp. 213-224 (doi: 10.1145/1140335.1140361).
  • [12] M. R. Czenko et al., "Nonmonotonic trust management for P2P applications", in Proc. 1st Int. Worksh. on Secur. Trust Manag. STM 2005, Milan, Italy, 2005, pp. 113-130 (doi: 10.1016/j.entcs.2005.09.037).
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9b953333-b65b-4100-85ce-3c84028f2f4b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.