Trustworthiness-based authorization delegation model

被引:0
|
作者
Liao, Jun-Guo [1 ,2 ]
Hong, Fan [2 ]
Zhu, Geng-Ming [1 ,2 ]
Yang, Qiu-Wei [2 ]
机构
[1] School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
[2] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
来源
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1265 / 1270
相关论文
共 50 条
  • [41] Delegation-based Authentication and Authorization for the IP-based Internet of Things
    Hummen, Rene
    Shafagh, Hossein
    Raza, Shahid
    Voigt, Thiemo
    Wehrle, Klaus
    2014 ELEVENTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2014, : 284 - 292
  • [42] A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs
    Wang, Chen
    Shen, Jian
    Lai, Jin-Feng
    Liu, Jianwei
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 794 - 799
  • [43] Verification of authorization policies modified by delegation
    Egea, Marina
    Büttner, Fabian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 287 - 314
  • [44] Logic-based knowledge representation for authorization with delegation (extended abstract)
    Li, Ninghui
    Feigenbaum, Joan
    Grosof, Benjamin N.
    Proceedings of the Computer Security Foundations Workshop, 1999, : 162 - 174
  • [45] A logic-based knowledge representation for authorization with delegation (extended abstract)
    Li, N
    Feigenbaum, J
    Grosof, BN
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 162 - 174
  • [46] The role delegation authorization model of a computer-supported cooperative design system
    Xu H.
    Liu Y.
    Guo X.
    Sheng Z.
    Frontiers of Mechanical Engineering in China, 2007, 2 (2): : 201 - 204
  • [47] Enable delegation for RBAC with Secure Authorization Certificate
    Zhou, GuangXu
    Demirer, Murat
    Bayrak, Coskun
    Wang, Licheng
    COMPUTERS & SECURITY, 2011, 30 (08) : 780 - 790
  • [48] FlexAuth: A Decentralized Authorization System with Flexible Delegation
    Fei, Ziyu
    Li, Ying
    Wei, Jiuqi
    Fu, Yufan
    Peng, Botao
    Li, Xiaodong
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1790 - 1797
  • [49] RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
    Sun, Wei
    International Journal of Network Security, 2023, 25 (04) : 666 - 679
  • [50] WAVE: A Decentralized Authorization Framework with Transitive Delegation
    Andersen, Michael P.
    Kumar, Sam
    AbdelBaky, Moustafa
    Fierro, Gabe
    Kolb, John
    Kim, Hyung-Sin
    Culler, David E.
    Popa, Raluca Ada
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1375 - 1392