Loading...

A trust and reputation-based access control model for virtual organizations

Arasteh, M ; Sharif University of Technology | 2012

854 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2012.6408204
  3. Publisher: 2012
  4. Abstract:
  5. Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control requirements which cannot be satisfied using the traditional access control models. This is basically due to special features of VOs; such as temporality, unknown users, and diverse resources. In this paper, after expressing our assumption on a framework for VOs; the concept of organizational trust and reputation is used to establish an access control model for VOs. Each member of an organization inherits its organizational reputation. Resource providers announce the behavior of their interacting users to their organization manager. According to the received feedbacks, organization managers calculate the new amount of trust for each guest organization. Afterwards, the VO manager calculates organizations reputation by integrating trust values received from organizations. A selfish organization may use the other organization resources and not offer any resources to the requester organizations. To overcome this problem, we use single policy and authorization system for all members of the VO. By combining resource providers' policies, a unique policy for each shared resource in the VO will be formed. In VOs there are various and heterogeneous entities, to address this challenge and preparing common perception we suggest using ontology in the virtual organization. The advantage and usefulness of the proposed method is compared with the conventional approaches
  6. Keywords:
  7. Virtual Organization (VO) ; Access control models ; Authorization systems ; Conventional approach ; Interorganizational collaboration ; Organizational Reputation ; Organizational Trust ; Resource providers ; Shared resources ; Trust and reputation ; Trust values ; Computation theory ; Cryptography ; Management ; Managers ; Societies and institutions ; Access control
  8. Source: 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 02012 through 14 September 2012 ; September , 2012 , Pages 121-127 ; 9781467323864 (ISBN)
  9. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6408204