Trust-Based Usage Control in Collaborative Environment

Trust-Based Usage Control in Collaborative Environment

Li Yang, Chang Phuong, Amy Novobilski, Raimund K. Ege
Copyright: © 2008 |Volume: 2 |Issue: 2 |Pages: 15
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203260|EISSN: 1930-1669|DOI: 10.4018/jisp.2008040103
Cite Article Cite Article

MLA

Yang, Li, et al. "Trust-Based Usage Control in Collaborative Environment." IJISP vol.2, no.2 2008: pp.31-45. http://doi.org/10.4018/jisp.2008040103

APA

Yang, L., Phuong, C., Novobilski, A., & Ege, R. K. (2008). Trust-Based Usage Control in Collaborative Environment. International Journal of Information Security and Privacy (IJISP), 2(2), 31-45. http://doi.org/10.4018/jisp.2008040103

Chicago

Yang, Li, et al. "Trust-Based Usage Control in Collaborative Environment," International Journal of Information Security and Privacy (IJISP) 2, no.2: 31-45. http://doi.org/10.4018/jisp.2008040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.