Abstract
Virtual organizations normally use role-based access control mechanisms to assign permissions that allow users to access resources or services. Role-based access control mechanisms, however, have three limitations. First, as only one type of trust relationship - resource trusts role - exists in the mechanisms, more trust relationships that support more types of access controls in virtual organizations can not be established. Second, as roles are created in and limited to specific collaborative work places, the permissions only take effects in the local work places, and no global permissions can be set up. Finally, the attributes of users or groups, as important resources, have no control in the mechanisms. In other words, those attributes can not be released to any other user or group. To overcome these limitations, our research provides a trust-based access control model for virtual organizations. This paper presents the model, algorithm, implementations, and experimental results.
Original language | English |
---|---|
Title of host publication | Proceedings of the 5th international conference on grid and cooperative computing (GCC 2006) |
Place of Publication | United States |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 557-564 |
Number of pages | 8 |
ISBN (Print) | 0769526950 |
DOIs | |
Publication status | Published - 2006 |
Event | International Conference on Grid and Cooperative Computing (5th : 2006) - Hunan, China Duration: 20 Oct 2006 → 23 Oct 2006 |
Conference
Conference | International Conference on Grid and Cooperative Computing (5th : 2006) |
---|---|
City | Hunan, China |
Period | 20/10/06 → 23/10/06 |
Bibliographical note
Copyright 2006 IEEE. Reprinted from Proceedings of the 5th international conference on grid and cooperative computing (GCC 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.Keywords
- authorisation
- distributed processing