Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

Privacy and contextual integrity: Framework and applications

A Barth, A Datta, JC Mitchell… - 2006 IEEE symposium …, 2006 - ieeexplore.ieee.org
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy …

Trust-based security for wireless ad hoc and sensor networks

A Boukerch, L Xu, K El-Khatib - Computer Communications, 2007 - Elsevier
Wireless sensors networks are susceptible to a large number of security threats, and
because of the communication, computation and delay constraints of most applications that …

A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory

R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless
links, battlefield applications and nodes exposed to the environment without good physical …

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …

ROWLBAC: representing role based access control in OWL

T Finin, A Joshi, L Kagal, J Niu, R Sandhu… - Proceedings of the 13th …, 2008 - dl.acm.org
There have been two parallel themes in access control research in recent years. On the one
hand there are efforts to develop new access control models to meet the policy needs of real …

Hails: Protecting data privacy in untrusted web applications

DB Giffin, A Levy, D Stefan, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Modern extensible web platforms like Facebook and Yammer depend on third-party
software to offer a rich experience to their users. Unfortunately, users running a third-party …

Detecting and resolving policy misconfigurations in access-control systems

L Bauer, S Garriss, MK Reiter - ACM Transactions on Information and …, 2011 - dl.acm.org
Access-control policy misconfigurations that cause requests to be erroneously denied can
result in wasted time, user frustration, and, in the context of particular applications (eg, health …

Trust models in ubiquitous computing

K Krukow, M Nielsen… - … Transactions of the …, 2008 - royalsocietypublishing.org
Trust models in ubiquitous computing | Philosophical Transactions of the Royal Society A:
Mathematical, Physical and Engineering Sciences logo logo Skip main navigationJournal …

An attribute-based access control model for web services

H Shen, F Hong - 2006 Seventh International Conference on …, 2006 - ieeexplore.ieee.org
Web service is a new service-oriented computing paradigm which poses the unique security
challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic …