DocumentCode :
2199536
Title :
Trust based access control scheme for pervasive computing environment
Author :
Hema, A.M. ; Kuppusamy, K.
Author_Institution :
Dept. of Comput. Sci., Thiagarajar Coll., Madurai, India
fYear :
2012
fDate :
19-21 April 2012
Firstpage :
157
Lastpage :
161
Abstract :
With the rapid growth in the communication technology we are moving towards an era of pervasive computing environment. Access control is very challenging in this environment. The proposed trust based access control scheme is built on the trustworthiness of users. Access control is achieved depending on the trust value evaluated for the request of services. Here, either we are going to have the access in direct or indirect way. The trustworthiness of the user and the recommender are formulated using fuzzy set and fuzzy logic. This scheme differs with respect to the features they provide, and the type of the trust constraints, they support.
Keywords :
authorisation; fuzzy logic; fuzzy set theory; ubiquitous computing; communication technology; fuzzy logic; fuzzy set; pervasive computing environment; trust based access control scheme; trust constraints; trust value; user trustworthiness; Access control; Computational modeling; Databases; Fuzzy logic; Permission; Pervasive computing; Pervasive computing; access control; fuzzy logic; fuzzy set; trust value;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Recent Trends In Information Technology (ICRTIT), 2012 International Conference on
Conference_Location :
Chennai, Tamil Nadu
Print_ISBN :
978-1-4673-1599-9
Type :
conf
DOI :
10.1109/ICRTIT.2012.6206779
Filename :
6206779
Link To Document :
بازگشت