Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

A unified attribute-based access control model covering DAC, MAC and RBAC

X **, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

A survey of trust in computer science and the semantic web

D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …

A reputation-based approach for choosing reliable resources in peer-to-peer networks

E Damiani, DC di Vimercati, S Paraboschi… - Proceedings of the 9th …, 2002 - dl.acm.org
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced
P2P services have reached tens of millions of users. A feature that significantly contributes to …

[KNYGA][B] Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

L Buttyan, JP Hubaux - 2007 - books.google.com
This is the first self-contained text to consider security and non-cooperative behavior in
wireless networks. Major networking trends are analyzed and their implications explained in …

A logic-based framework for attribute based access control

L Wang, D Wijesekera, S Jajodia - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
Attribute based access control (ABAC) grants accesses to services based on the attributes
possessed by the requester. Thus, ABAC differs from the traditional discretionary access …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …

Trust management tools for internet applications

T Grandison, M Sloman - … , iTrust 2003 Heraklion, Crete, Greece, May 28 …, 2003 - Springer
Trust management has received a lot of attention recently as it is an important component of
decision making for electronic commerce, Internet interactions and electronic contract …

Develo** trust in large-scale peer-to-peer systems

B Yu, MP Singh, K Sycara - IEEE First Symposium onMulti …, 2004 - ieeexplore.ieee.org
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers
without the benefit of trusted third parties or authorities to mediate the interactions. A peer …

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation

T Yu, M Winslett, KE Seamons - ACM Transactions on Information and …, 2003 - dl.acm.org
Business and military partners, companies and their customers, and other closely
cooperating parties may have a compelling need to conduct sensitive interactions on line …