• DocumentCode
    2199536
  • Title

    Trust based access control scheme for pervasive computing environment

  • Author

    Hema, A.M. ; Kuppusamy, K.

  • Author_Institution
    Dept. of Comput. Sci., Thiagarajar Coll., Madurai, India
  • fYear
    2012
  • fDate
    19-21 April 2012
  • Firstpage
    157
  • Lastpage
    161
  • Abstract
    With the rapid growth in the communication technology we are moving towards an era of pervasive computing environment. Access control is very challenging in this environment. The proposed trust based access control scheme is built on the trustworthiness of users. Access control is achieved depending on the trust value evaluated for the request of services. Here, either we are going to have the access in direct or indirect way. The trustworthiness of the user and the recommender are formulated using fuzzy set and fuzzy logic. This scheme differs with respect to the features they provide, and the type of the trust constraints, they support.
  • Keywords
    authorisation; fuzzy logic; fuzzy set theory; ubiquitous computing; communication technology; fuzzy logic; fuzzy set; pervasive computing environment; trust based access control scheme; trust constraints; trust value; user trustworthiness; Access control; Computational modeling; Databases; Fuzzy logic; Permission; Pervasive computing; Pervasive computing; access control; fuzzy logic; fuzzy set; trust value;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Recent Trends In Information Technology (ICRTIT), 2012 International Conference on
  • Conference_Location
    Chennai, Tamil Nadu
  • Print_ISBN
    978-1-4673-1599-9
  • Type

    conf

  • DOI
    10.1109/ICRTIT.2012.6206779
  • Filename
    6206779