• DocumentCode
    3285202
  • Title

    Trust Based Authorization and Access Control

  • Author

    Fujun, Feng ; Junshan, Li

  • Author_Institution
    Dept. of Comput., Second Artillery Eng. Coll., Xi´´an, China
  • Volume
    3
  • fYear
    2009
  • fDate
    15-17 May 2009
  • Firstpage
    162
  • Lastpage
    165
  • Abstract
    Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.
  • Keywords
    authorisation; access control; national college entrance system; trust and context based access control; trust based authorization; Access control; Application software; Authorization; Computer security; Context modeling; Information security; Information technology; Peer to peer computing; Permission; Protection; access control; authorization; rule; trust;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology and Applications, 2009. IFITA '09. International Forum on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-0-7695-3600-2
  • Type

    conf

  • DOI
    10.1109/IFITA.2009.240
  • Filename
    5232085