[go: up one dir, main page]

Yaich, 2019 - Google Patents

Trust management systems: A retrospective study on digital trust

Yaich, 2019

Document ID
8352063185714009359
Author
Yaich R
Publication year
Publication venue
Cyber‐Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

External Links

Snippet

This chapter analyzes the digital trust and identifies the mechanisms underlying trust management systems. It reviews the different models and systems that have been proposed in the discipline. The chapter provides a clear definition of trust. It presents a historical view …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Similar Documents

Publication Publication Date Title
McDaniel et al. Methods and limitations of security policy reconciliation
JP5690935B2 (en) System and method for secure agent information
Almenárez et al. TrustAC: Trust-based access control for pervasive devices
Akaichi et al. Usage control specification, enforcement, and robustness: A survey
Preuveneers et al. Policy reconciliation for access control in dynamic cross-enterprise collaborations
Ardagna et al. Minimising disclosure of client information in credential-based interactions
Becker Cassandra: flexible trust management and its application to electronic health records
Mont et al. EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations
Badr et al. The integration of corporate security strategies in collaborative business processes
Yaich Trust management systems: A retrospective study on digital trust
Habiba et al. A new approach to access control in cloud
Sommer et al. PRIME architecture V3
Runsewe A policy-based management framework for cloud computing security
Imran-Daud Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud
Munakami Developing an ABAC-based grant proposal workflow management system
Lee et al. Automated trust negotiation in open systems
Takabi A semantic based policy management framework for cloud computing environments
Fatema Adding privacy protection to policy based authorisation systems
Zenden The identity mangement solution that improves data sharing in logistics
Jingya Data centered Usage based Protection in a SMACIT context
Jaramillo A semantic contract model and knowledge-driven process for supporting controllability in service-oriented approaches
Zhengqiu et al. Research of Secure Service Composition Based on Semantic Security Policy
Samarati et al. Final research report on next generation policies
Casassa-Mont Architecture V2 Author: WP 14.2 Editor: Marco Casassa-Mont, Stefano Crosta, Thomas Kriegelstein, Dieter Sommer Reviewers
Richter Practical User Access Control for Large-Scale Companies