Trust Based Authorization and Access Control
Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic e...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 165 |
---|---|
container_issue | |
container_start_page | 162 |
container_title | |
container_volume | 3 |
creator | Feng Fujun Li Junshan |
description | Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules. |
doi_str_mv | 10.1109/IFITA.2009.240 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5232085</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5232085</ieee_id><sourcerecordid>5232085</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-da96ec96fece264143312d2d6c084091ab40094d51016850b1c2db14feba3e813</originalsourceid><addsrcrecordid>eNotjk1LxDAURQMyMDp2Oxs3_QG2vpevJstaHC0MuKnrIU1esTK2knQW-ust6N1cOBcOl7E9QokI9qE9tF1dcgBbcglXLLOVgUpbJTQA37CbdTIW0Rq9ZVlKH7BGKSM5XLP7Ll7Skj-6RCGvL8v7HMcft4zzlLtpJd5TSnkzT0ucz7dsM7hzouy_d-zt8NQ1L8Xx9blt6mMxYqWWIjiryVs9kCeuJUohkAcetAcjwaLr5XpWBoWA2ijo0fPQoxyod4IMih27-_OORHT6iuOni98nxQUHo8QvayBBxw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Based Authorization and Access Control</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Feng Fujun ; Li Junshan</creator><creatorcontrib>Feng Fujun ; Li Junshan</creatorcontrib><description>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</description><identifier>ISBN: 9780769536002</identifier><identifier>ISBN: 076953600X</identifier><identifier>DOI: 10.1109/IFITA.2009.240</identifier><identifier>LCCN: 2008911986</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Application software ; Authorization ; Computer security ; Context modeling ; Information security ; Information technology ; Peer to peer computing ; Permission ; Protection ; rule ; trust</subject><ispartof>2009 International Forum on Information Technology and Applications, 2009, Vol.3, p.162-165</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5232085$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5232085$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Feng Fujun</creatorcontrib><creatorcontrib>Li Junshan</creatorcontrib><title>Trust Based Authorization and Access Control</title><title>2009 International Forum on Information Technology and Applications</title><addtitle>IFITA</addtitle><description>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</description><subject>Access control</subject><subject>Application software</subject><subject>Authorization</subject><subject>Computer security</subject><subject>Context modeling</subject><subject>Information security</subject><subject>Information technology</subject><subject>Peer to peer computing</subject><subject>Permission</subject><subject>Protection</subject><subject>rule</subject><subject>trust</subject><isbn>9780769536002</isbn><isbn>076953600X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjk1LxDAURQMyMDp2Oxs3_QG2vpevJstaHC0MuKnrIU1esTK2knQW-ust6N1cOBcOl7E9QokI9qE9tF1dcgBbcglXLLOVgUpbJTQA37CbdTIW0Rq9ZVlKH7BGKSM5XLP7Ll7Skj-6RCGvL8v7HMcft4zzlLtpJd5TSnkzT0ucz7dsM7hzouy_d-zt8NQ1L8Xx9blt6mMxYqWWIjiryVs9kCeuJUohkAcetAcjwaLr5XpWBoWA2ijo0fPQoxyod4IMih27-_OORHT6iuOni98nxQUHo8QvayBBxw</recordid><startdate>200905</startdate><enddate>200905</enddate><creator>Feng Fujun</creator><creator>Li Junshan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200905</creationdate><title>Trust Based Authorization and Access Control</title><author>Feng Fujun ; Li Junshan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-da96ec96fece264143312d2d6c084091ab40094d51016850b1c2db14feba3e813</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Application software</topic><topic>Authorization</topic><topic>Computer security</topic><topic>Context modeling</topic><topic>Information security</topic><topic>Information technology</topic><topic>Peer to peer computing</topic><topic>Permission</topic><topic>Protection</topic><topic>rule</topic><topic>trust</topic><toplevel>online_resources</toplevel><creatorcontrib>Feng Fujun</creatorcontrib><creatorcontrib>Li Junshan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Feng Fujun</au><au>Li Junshan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Based Authorization and Access Control</atitle><btitle>2009 International Forum on Information Technology and Applications</btitle><stitle>IFITA</stitle><date>2009-05</date><risdate>2009</risdate><volume>3</volume><spage>162</spage><epage>165</epage><pages>162-165</pages><isbn>9780769536002</isbn><isbn>076953600X</isbn><abstract>Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.</abstract><pub>IEEE</pub><doi>10.1109/IFITA.2009.240</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769536002 |
ispartof | 2009 International Forum on Information Technology and Applications, 2009, Vol.3, p.162-165 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5232085 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Application software Authorization Computer security Context modeling Information security Information technology Peer to peer computing Permission Protection rule trust |
title | Trust Based Authorization and Access Control |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T11%3A25%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Based%20Authorization%20and%20Access%20Control&rft.btitle=2009%20International%20Forum%20on%20Information%20Technology%20and%20Applications&rft.au=Feng%20Fujun&rft.date=2009-05&rft.volume=3&rft.spage=162&rft.epage=165&rft.pages=162-165&rft.isbn=9780769536002&rft.isbn_list=076953600X&rft_id=info:doi/10.1109/IFITA.2009.240&rft_dat=%3Cieee_6IE%3E5232085%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5232085&rfr_iscdi=true |