A hybrid trust model for authorisation using trusted platforms

Aarthi Krishna*, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

5 Citations (Scopus)

Abstract

Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necessary privileges to access a requested resource. However, when it comes to the user's platform, it is often assumed that the system hosting the user and the software running on it are 'trusted' and that it will behave correctly. In this paper, we propose a hybrid trust model that provides techniques for authorisation taking into account state of user platforms leveraging trusted computing technology. The model encompasses the notions of 'hard' and 'soft' trust to determine whether a platform can be trusted for authorisation. We first explain the rationale for the model and then provide a description of the proposed hybrid model.

Original languageEnglish
Title of host publicationTrustCom 2011
Subtitle of host publication2011 international joint conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11: 16-18 November 2011, Changsha, Hunan, P. R. China
EditorsGuojun Wang, Stephen R. Tate, Jian-Jia Chen, Kouichi Sakurai
Place of PublicationLos Alamitos, Calif
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages288-295
Number of pages8
ISBN (Print)9780769546001
DOIs
Publication statusPublished - 2011
Event10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), 8th IEEE International Conference on Embedded Software and Systems (ICESS 2011), 6th International Conference on Frontier of Computer Science and Technology (FCST 2011) - Changsha, China
Duration: 16 Nov 201118 Nov 2011

Other

Other10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), 8th IEEE International Conference on Embedded Software and Systems (ICESS 2011), 6th International Conference on Frontier of Computer Science and Technology (FCST 2011)
Country/TerritoryChina
CityChangsha
Period16/11/1118/11/11

Fingerprint

Dive into the research topics of 'A hybrid trust model for authorisation using trusted platforms'. Together they form a unique fingerprint.

Cite this