DocumentCode
2199536
Title
Trust based access control scheme for pervasive computing environment
Author
Hema, A.M. ; Kuppusamy, K.
Author_Institution
Dept. of Comput. Sci., Thiagarajar Coll., Madurai, India
fYear
2012
fDate
19-21 April 2012
Firstpage
157
Lastpage
161
Abstract
With the rapid growth in the communication technology we are moving towards an era of pervasive computing environment. Access control is very challenging in this environment. The proposed trust based access control scheme is built on the trustworthiness of users. Access control is achieved depending on the trust value evaluated for the request of services. Here, either we are going to have the access in direct or indirect way. The trustworthiness of the user and the recommender are formulated using fuzzy set and fuzzy logic. This scheme differs with respect to the features they provide, and the type of the trust constraints, they support.
Keywords
authorisation; fuzzy logic; fuzzy set theory; ubiquitous computing; communication technology; fuzzy logic; fuzzy set; pervasive computing environment; trust based access control scheme; trust constraints; trust value; user trustworthiness; Access control; Computational modeling; Databases; Fuzzy logic; Permission; Pervasive computing; Pervasive computing; access control; fuzzy logic; fuzzy set; trust value;
fLanguage
English
Publisher
ieee
Conference_Titel
Recent Trends In Information Technology (ICRTIT), 2012 International Conference on
Conference_Location
Chennai, Tamil Nadu
Print_ISBN
978-1-4673-1599-9
Type
conf
DOI
10.1109/ICRTIT.2012.6206779
Filename
6206779
Link To Document