Trustworthiness-based authorization delegation model

被引:0
|
作者
Liao, Jun-Guo [1 ,2 ]
Hong, Fan [2 ]
Zhu, Geng-Ming [1 ,2 ]
Yang, Qiu-Wei [2 ]
机构
[1] School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
[2] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
来源
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1265 / 1270
相关论文
共 50 条
  • [1] A Trustworthiness-Based Distribution Model for Data Leakage Prevention
    YIN Fan1
    2. College of Computer Science
    3. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education
    WuhanUniversityJournalofNaturalSciences, 2010, 15 (03) : 205 - 209
  • [2] A Model for Delegation Based on Authentication and Authorization
    Chandersekaran, Coimbatore
    Simpson, William R.
    ADVANCED COMPUTING, PT III, 2011, 133 : 217 - +
  • [3] AT-RBAC:: An authentication trustworthiness-based RBAC model
    Wang, LW
    Wei, LF
    Liao, XK
    Wang, HM
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 343 - 350
  • [4] Controllable Delegation Model Based on Usage and Trustworthiness
    Luo, Xin
    Yang, Yixian
    Hu, Zhengming
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 745 - 749
  • [5] A New Trust Model for Trustworthiness-based Routing Protocols in Sensor Networks
    Yu, Ming
    Liu, Wei
    Xing, Tian
    2012 19TH INTERNATIONAL CONFERENCE MECHATRONICS AND MACHINE VISION IN PRACTICE (M2VIP), 2012, : 56 - 61
  • [6] Trustworthiness-based Group Communication Protocols
    Kouno, Kazuaki
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 488 - 492
  • [7] Trustworthiness-based Broadcast Protocols in Wireless Networks
    Sugino, Miyu
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 125 - 132
  • [8] Credential trustworthiness-based trust evaluation in grid
    Qu, XL
    Yang, XJ
    Xiang, G
    Zhou, HF
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 554 - 560
  • [9] GADAM: an authorization model based on attribute delegation in grid
    Wang Rongbin
    Chen Shuyu
    Li Jing
    2008 WORKSHOP ON POWER ELECTRONICS AND INTELLIGENT TRANSPORTATION SYSTEM, PROCEEDINGS, 2008, : 546 - +
  • [10] Trustworthiness-based dynamic access control for grid application
    Chen, Xu-Ri
    Xu, Wei-Min
    Shen, Wen-Feng
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2008, 35 (07): : 85 - 89