Title :
Trust based access control scheme for pervasive computing environment
Author :
Hema, A.M. ; Kuppusamy, K.
Author_Institution :
Dept. of Comput. Sci., Thiagarajar Coll., Madurai, India
Abstract :
With the rapid growth in the communication technology we are moving towards an era of pervasive computing environment. Access control is very challenging in this environment. The proposed trust based access control scheme is built on the trustworthiness of users. Access control is achieved depending on the trust value evaluated for the request of services. Here, either we are going to have the access in direct or indirect way. The trustworthiness of the user and the recommender are formulated using fuzzy set and fuzzy logic. This scheme differs with respect to the features they provide, and the type of the trust constraints, they support.
Keywords :
authorisation; fuzzy logic; fuzzy set theory; ubiquitous computing; communication technology; fuzzy logic; fuzzy set; pervasive computing environment; trust based access control scheme; trust constraints; trust value; user trustworthiness; Access control; Computational modeling; Databases; Fuzzy logic; Permission; Pervasive computing; Pervasive computing; access control; fuzzy logic; fuzzy set; trust value;
Conference_Titel :
Recent Trends In Information Technology (ICRTIT), 2012 International Conference on
Conference_Location :
Chennai, Tamil Nadu
Print_ISBN :
978-1-4673-1599-9
DOI :
10.1109/ICRTIT.2012.6206779