A Trust-based access control model for virtual organizations

Aizhong Lin, Erik Vullings, James Dalziel

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    22 Citations (Scopus)
    67 Downloads (Pure)

    Abstract

    Virtual organizations normally use role-based access control mechanisms to assign permissions that allow users to access resources or services. Role-based access control mechanisms, however, have three limitations. First, as only one type of trust relationship - resource trusts role - exists in the mechanisms, more trust relationships that support more types of access controls in virtual organizations can not be established. Second, as roles are created in and limited to specific collaborative work places, the permissions only take effects in the local work places, and no global permissions can be set up. Finally, the attributes of users or groups, as important resources, have no control in the mechanisms. In other words, those attributes can not be released to any other user or group. To overcome these limitations, our research provides a trust-based access control model for virtual organizations. This paper presents the model, algorithm, implementations, and experimental results.
    Original languageEnglish
    Title of host publicationProceedings of the 5th international conference on grid and cooperative computing (GCC 2006)
    Place of PublicationUnited States
    PublisherInstitute of Electrical and Electronics Engineers (IEEE)
    Pages557-564
    Number of pages8
    ISBN (Print)0769526950
    DOIs
    Publication statusPublished - 2006
    EventInternational Conference on Grid and Cooperative Computing (5th : 2006) - Hunan, China
    Duration: 20 Oct 200623 Oct 2006

    Conference

    ConferenceInternational Conference on Grid and Cooperative Computing (5th : 2006)
    CityHunan, China
    Period20/10/0623/10/06

    Bibliographical note

    Copyright 2006 IEEE. Reprinted from Proceedings of the 5th international conference on grid and cooperative computing (GCC 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

    Keywords

    • authorisation
    • distributed processing

    Fingerprint

    Dive into the research topics of 'A Trust-based access control model for virtual organizations'. Together they form a unique fingerprint.

    Cite this