The Study of the Trust-Role Based Access Control

2012 ◽  
Vol 433-440 ◽  
pp. 7042-7045
Author(s):  
Zhong Wen Gao ◽  
Ming Sheng Zhang

In light of the problem of the security of Peer-to-Peer networks, an access control method is proposed which is based on the trust relationship between the peers in this paper. Thus the peers of different trust values can get different access authorities.

2004 ◽  
Vol 9 (5) ◽  
pp. 740-744
Author(s):  
Meng Xiao-feng ◽  
Luo Dao-feng ◽  
Ou Jian-bo

2018 ◽  
Vol 7 (3) ◽  
pp. 1795
Author(s):  
Rini Mahajan ◽  
Manish Mahajan ◽  
Dheerendra Singh

Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.  


2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

2014 ◽  
Vol 36 (7) ◽  
pp. 1456-1464 ◽  
Author(s):  
Da-Peng QU ◽  
Xing-Wei WANG ◽  
Min HUANG

Sign in / Sign up

Export Citation Format

Share Document