Trust-Based Usage Control in Collaborative Environment

Trust-Based Usage Control in Collaborative Environment

Li Yang, Chang Phuong, Amy Novobilski, Raimund K. Ege
ISBN13: 9781615209651|ISBN10: 1615209654|EISBN13: 9781615209668
DOI: 10.4018/978-1-61520-965-1.ch316
Cite Chapter Cite Chapter

MLA

Yang, Li, et al. "Trust-Based Usage Control in Collaborative Environment." Information Resources Management: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2010, pp. 751-765. https://doi.org/10.4018/978-1-61520-965-1.ch316

APA

Yang, L., Phuong, C., Novobilski, A., & Ege, R. K. (2010). Trust-Based Usage Control in Collaborative Environment. In I. Management Association (Ed.), Information Resources Management: Concepts, Methodologies, Tools and Applications (pp. 751-765). IGI Global. https://doi.org/10.4018/978-1-61520-965-1.ch316

Chicago

Yang, Li, et al. "Trust-Based Usage Control in Collaborative Environment." In Information Resources Management: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 751-765. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-965-1.ch316

Export Reference

Mendeley
Favorite

Abstract

Most access control models have formal access control rules to govern the authorization of a request from a principal. In pervasive and collaborative environments, the behaviors of a principal are uncertain due to partial information. Moreover, the attributes of a principal, requested objects, and contexts of a request are mutable during the collaboration. A variety of such uncertainty and mutability pose challenges when resources sharing must happen in the collaborative environment. In order to address the above challenges, we propose a framework to integrate trust management into a usage control model in order to support decision making in an ever-changing collaborative environment. First, a trust value of a principal is evaluated based on both observed behaviors and peer recommendations. Second, the usage-based access control rules are checked to make decisions on resource exchanges. Our framework handles uncertainty and mutability by dynamically disenrolling untrusted principals and revoking granted on-going access if access control rules are no longer met. We have applied our trust-based usage control framework to an application of file sharing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.