Trust Based Authorization and Access Control

Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Feng Fujun, Li Junshan
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 165
container_issue
container_start_page 162
container_title
container_volume 3
creator Feng Fujun
Li Junshan
description Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.
doi_str_mv 10.1109/IFITA.2009.240
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5232085</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5232085</ieee_id><sourcerecordid>5232085</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-da96ec96fece264143312d2d6c084091ab40094d51016850b1c2db14feba3e813</originalsourceid><addsrcrecordid>eNotjk1LxDAURQMyMDp2Oxs3_QG2vpevJstaHC0MuKnrIU1esTK2knQW-ust6N1cOBcOl7E9QokI9qE9tF1dcgBbcglXLLOVgUpbJTQA37CbdTIW0Rq9ZVlKH7BGKSM5XLP7Ll7Skj-6RCGvL8v7HMcft4zzlLtpJd5TSnkzT0ucz7dsM7hzouy_d-zt8NQ1L8Xx9blt6mMxYqWWIjiryVs9kCeuJUohkAcetAcjwaLr5XpWBoWA2ijo0fPQoxyod4IMih27-_OORHT6iuOni98nxQUHo8QvayBBxw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Based Authorization and Access Control</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Feng Fujun ; Li Junshan</creator><creatorcontrib>Feng Fujun ; Li Junshan</creatorcontrib><description>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</description><identifier>ISBN: 9780769536002</identifier><identifier>ISBN: 076953600X</identifier><identifier>DOI: 10.1109/IFITA.2009.240</identifier><identifier>LCCN: 2008911986</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Application software ; Authorization ; Computer security ; Context modeling ; Information security ; Information technology ; Peer to peer computing ; Permission ; Protection ; rule ; trust</subject><ispartof>2009 International Forum on Information Technology and Applications, 2009, Vol.3, p.162-165</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5232085$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5232085$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Feng Fujun</creatorcontrib><creatorcontrib>Li Junshan</creatorcontrib><title>Trust Based Authorization and Access Control</title><title>2009 International Forum on Information Technology and Applications</title><addtitle>IFITA</addtitle><description>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</description><subject>Access control</subject><subject>Application software</subject><subject>Authorization</subject><subject>Computer security</subject><subject>Context modeling</subject><subject>Information security</subject><subject>Information technology</subject><subject>Peer to peer computing</subject><subject>Permission</subject><subject>Protection</subject><subject>rule</subject><subject>trust</subject><isbn>9780769536002</isbn><isbn>076953600X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1LxDAURQMyMDp2Oxs3_QG2vpevJstaHC0MuKnrIU1esTK2knQW-ust6N1cOBcOl7E9QokI9qE9tF1dcgBbcglXLLOVgUpbJTQA37CbdTIW0Rq9ZVlKH7BGKSM5XLP7Ll7Skj-6RCGvL8v7HMcft4zzlLtpJd5TSnkzT0ucz7dsM7hzouy_d-zt8NQ1L8Xx9blt6mMxYqWWIjiryVs9kCeuJUohkAcetAcjwaLr5XpWBoWA2ijo0fPQoxyod4IMih27-_OORHT6iuOni98nxQUHo8QvayBBxw</recordid><startdate>200905</startdate><enddate>200905</enddate><creator>Feng Fujun</creator><creator>Li Junshan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200905</creationdate><title>Trust Based Authorization and Access Control</title><author>Feng Fujun ; Li Junshan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-da96ec96fece264143312d2d6c084091ab40094d51016850b1c2db14feba3e813</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Application software</topic><topic>Authorization</topic><topic>Computer security</topic><topic>Context modeling</topic><topic>Information security</topic><topic>Information technology</topic><topic>Peer to peer computing</topic><topic>Permission</topic><topic>Protection</topic><topic>rule</topic><topic>trust</topic><toplevel>online_resources</toplevel><creatorcontrib>Feng Fujun</creatorcontrib><creatorcontrib>Li Junshan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Feng Fujun</au><au>Li Junshan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Based Authorization and Access Control</atitle><btitle>2009 International Forum on Information Technology and Applications</btitle><stitle>IFITA</stitle><date>2009-05</date><risdate>2009</risdate><volume>3</volume><spage>162</spage><epage>165</epage><pages>162-165</pages><isbn>9780769536002</isbn><isbn>076953600X</isbn><abstract>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</abstract><pub>IEEE</pub><doi>10.1109/IFITA.2009.240</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769536002
ispartof 2009 International Forum on Information Technology and Applications, 2009, Vol.3, p.162-165
issn
language eng
recordid cdi_ieee_primary_5232085
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Application software
Authorization
Computer security
Context modeling
Information security
Information technology
Peer to peer computing
Permission
Protection
rule
trust
title Trust Based Authorization and Access Control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T11%3A25%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Based%20Authorization%20and%20Access%20Control&rft.btitle=2009%20International%20Forum%20on%20Information%20Technology%20and%20Applications&rft.au=Feng%20Fujun&rft.date=2009-05&rft.volume=3&rft.spage=162&rft.epage=165&rft.pages=162-165&rft.isbn=9780769536002&rft.isbn_list=076953600X&rft_id=info:doi/10.1109/IFITA.2009.240&rft_dat=%3Cieee_6IE%3E5232085%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5232085&rfr_iscdi=true