Author:
Iltaf Naima,Ghafoor Abdul,Hussain Mukhtar
Abstract
Abstract
To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. X-bar control chart is used to handle malicious recommendation. The defense mechanisms incorporated by proposed model against attacks such as bad mouthing attack, oscillating behavior attack and conflicting behavior attack are also demonstrated.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference31 articles.
1. Weiser M: The Computer for the Twenty-First Century. Scientific American; 1991.
2. Cahill V, Gray E, Seigneur J, Jensen C, Chen Y, Shand B, Dimmock N, Twigg A, Bacon J, Wagealla W, Terzis S, Nixon P, Serugendo G, Bryce C, Carbone M, Krukow K, Nielsen M: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing Mobile and Ubiquitous Computing 2003, 2: 52-61.
3. Robinson P, Vogt H, Wagealla W: Some Research Challenges in Pervasive Computing, Privacy, Security and Trust within the Context of Pervasive Computing. Volume 780. Springer, US; 2004:1-16.
4. English C, Nixon P, Terzis S, McGettrick A, Lowe H: Security models for trusting network appliances. In 5th IEEE International Workshop on Networked Appliances. Liverpool; 2002:39-44.
5. English C, Wagealla W, Nixon P, Terzis S, McGettrick A, Lowe H: Trusting collaboration in global computing. In 1st International Conference on trust management. Greece; 2003:136-149.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献