Trust Management and Context-Driven Access Control

Trust Management and Context-Driven Access Control

Paolo Bellavista, Rebecca Montanari, Daniela Tibaldi, Alessandra Toninelli
Copyright: © 2008 |Pages: 18
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch029
Cite Chapter Cite Chapter

MLA

Bellavista, Paolo, et al. "Trust Management and Context-Driven Access Control." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 461-478. https://doi.org/10.4018/978-1-59904-899-4.ch029

APA

Bellavista, P., Montanari, R., Tibaldi, D., & Toninelli, A. (2008). Trust Management and Context-Driven Access Control. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 461-478). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch029

Chicago

Bellavista, Paolo, et al. "Trust Management and Context-Driven Access Control." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 461-478. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch029

Export Reference

Mendeley
Favorite

Abstract

The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad hoc collaborations. This chapter introduces the challenge of identifying and validating novel security models/systems for securing ad hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-theart solutions for trust management and access control in wireless environments by pointing out both the need for their tight integration and the related emerging design guidelines, that is, exploitation of context awareness and adoption of semantic technologies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.