Affiliation:
1. University of Trento, Povo (Trento), Italy
Abstract
Autonomic communication and computing is a new paradigm for dynamic service integration over a network. An autonomic network crosses organizational and management boundaries and is provided by entities that see each other just as partners. For many services no autonomic partner may guess a priori what will be sent by clients nor clients know a priori what credentials are required to access a service.
To address this problem we propose a new
interactive access control
: servers should interact with clients, asking for missing credentials necessary to grant access, whereas clients may supply or decline the requested credentials. Servers evaluate their policies and interact with clients until a decision of grant or deny is taken.
This proposal is grounded in a formal model on policy-based access control. It identifies the formal reasoning services of deduction, abduction and consistency. Based on them, the work proposes a comprehensive access control framework for autonomic systems. An implementation of the interactive model is given followed by system performance evaluation.
Funder
Sixth Framework Programme
Publisher
Association for Computing Machinery (ACM)
Subject
Software,Computer Science (miscellaneous),Control and Systems Engineering
Reference36 articles.
1. Apt K. 1990. Logic programming. In Handbook of Theoretical Computer Science J. van Leeuwen Ed. Elsevier. Apt K. 1990. Logic programming. In Handbook of Theoretical Computer Science J. van Leeuwen Ed. Elsevier.
2. On Interoperable Trust Negotiation Strategies
3. A logical framework for reasoning about access control models
4. Trust-X: A Peer-to-Peer Framework for Trust Establishment
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Self-improving system integration: Mastering continuous change;Future Generation Computer Systems;2021-04
2. Security-enabled Enactment of Decentralized Workflows;Proceedings of the 9th International Conference on Security of Information and Networks;2016-07-20
3. Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing;ACM Transactions on Autonomous and Adaptive Systems;2014-03
4. Self-Adaptive Access Control Model Based on Feedback Loop;2013 International Conference on Cloud Computing and Big Data;2013-12
5. GEM: A distributed goal evaluation algorithm for trust management;Theory and Practice of Logic Programming;2012-12-03