Access the full text.
Sign up today, get DeepDyve free for 14 days.
Deborah Hughes-Hallett, Patti Lock, A. Gleason, Jeffrey Tecosky-Feldman (2009)
Applied Calculus, 4th ed
M. d'Inverno, M. Luck, M. Fisher, C. Preist (2002)
Foundations and Applications of Multi-Agent Systems, 2403
Jacques Wainer, Akhil Kumar (2005)
A fine-grained, controllable, user-to-user delegation method in RBAC
Lei Li, Yan Wang, V. Varadharajan (2009)
Fuzzy Regression Based Trust Prediction in Service-Oriented Applications
N. Griffiths (2005)
Task delegation using experience-based multi-dimensional trust
V. Atluri, Janice Warner (2005)
Supporting conditional delegation in secure workflow management systems
Min Li, Hua Wang (2008)
ABDM: An extended flexible delegation model in RBAC2008 8th IEEE International Conference on Computer and Information Technology
E Barka, R Sandhu (2000)
ACSAC 2000: Proceedings of the 16th annual computer security applications conference, Washington, DC, USA
S. Marti, H. Garcia-Molina (2004)
Limited reputation sharing in P2P systems
M. Abadi, M. Burrows, B. Lampson, G. Plotkin (1991)
A calculus for access control in distributed systems
J. Crampton, Hemanth Khambhammettu (2006)
Delegation in role-based access controlInternational Journal of Information Security, 7
S. Na, Suh-Hyun Cheon (2000)
Role delegation in role-based access control
Yan Wang, V. Varadharajan (2004)
Interaction Trust Evaluation in Decentralized Environments
S Na, S Cheon (2000)
RBAC 2000: Proceedings of the fifth ACM workshop on role-based access control
Li Xiong, Ling Liu (2004)
PeerTrust: supporting reputation-based trust for peer-to-peer electronic communitiesIEEE Transactions on Knowledge and Data Engineering, 16
Thomas Hardjono, Tetsuya Chikaraishi, Tadashi Ohta (1993)
Secure delegation of tasks in distributed systemsProceedings the Tenth Project International Symposium, 1993
P. Bonatti, P. Samarati (2002)
A Uniform Framework for Regulating Service Access and Information Release on the WebJ. Comput. Secur., 10
S. Ramchurn, C. Sierra, L. Godo, N. Jennings (2003)
A computational trust model for multi-agent interactions based on confidence and reputation
J Wainer, A Kumar (2005)
SACMAT 2005: Proceedings of the tenth ACM symposium on access control models and technologies
Longhua Zhang, Gail-Joon Ahn, B. Chu (2003)
A rule-based framework for role-based delegation and revocationACM Trans. Inf. Syst. Secur., 6
S. Kamvar, M. Schlosser, Hector Garcia-Molina (2003)
The Eigentrust algorithm for reputation management in P2P networks
G. Zacharia, P. Maes (2000)
Trust management through reputation mechanismsApplied Artificial Intelligence, 14
Y Wang, V Varadharajan (2004)
Proceedings of 5th international conference on electronic commerce and Web technologies (EC-Web’04), Zaragoza, Spain, LNCS, Vol. 3182
W. Winsborough, Ninghui Li (2002)
Towards practical automated trust negotiationProceedings Third International Workshop on Policies for Distributed Systems and Networks
T. Norman, C. Reed (2002)
A Model of Delegation for Multi-agent Systems
E. Barka, R. Sandhu (2000)
Framework for role-based delegation modelsProceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
Longhua Zhang, Gail-Joon Ahn, B. Chu (2001)
A rule-based framework for role based delegation
(2008)
and H
P Bonatti, P Samarati (2002)
A unified framework for regulating access and information release on the WebJournal of Computer Security, 10
W. Nejdl, D. Olmedilla, M. Winslett (2004)
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
S Waner, SR Costenoble (2007)
Applied calculus
(2012)
J Intell Inf Syst
Xinwen Zhang, Sejong Oh, R. Sandhu (2003)
PBDM: a flexible delegation model in RBAC
J. Joshi, E. Bertino (2006)
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Min Li, Hua Wang, David Ross (2009)
Trust-Based Access Control for Privacy Protection in Collaborative Environment2009 IEEE International Conference on e-Business Engineering
Zhiheng Xie, Chi-Hung Chi (2007)
Quantifying Trust through Delegation in Service Oriented Architecture2007 IEEE Congress on Services (Services 2007)
M. Hazewinkel (1987)
Encyclopaedia of mathematicsThe Mathematical Gazette, 80
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, F. Violante (2002)
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that the privileges should be delegated to a person who is trustworthy. In this paper, we propose a multi-level delegation model with trust management in access control systems. We organize the delegation tasks into three levels, Low, Medium, and High, according to the sensitivity of the information contained in the delegation tasks. It motivates us that the more sensitive the delegated task is, the more trustworthy the delegatee should be. In order to assess how trustworthy a delegatee is, we devise trust evaluation techniques to describe a delegatee’s trust history and also predict the future trend of trust. In our proposed delegation model, a delegatee with a higher trust level could be assigned with a higher level delegation task. Extensive experiments show that our proposed multi-level delegation model is effective in accurately predicting trust and avoiding sensitive information disclosure.
Journal of Intelligent Information Systems – Springer Journals
Published: May 9, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.