Yaich, 2019 - Google Patents
Trust management systems: A retrospective study on digital trustYaich, 2019
- Document ID
- 8352063185714009359
- Author
- Yaich R
- Publication year
- Publication venue
- Cyber‐Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
External Links
Snippet
This chapter analyzes the digital trust and identifies the mechanisms underlying trust management systems. It reviews the different models and systems that have been proposed in the discipline. The chapter provides a clear definition of trust. It presents a historical view …
- 239000003795 chemical substances by application 0 description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
McDaniel et al. | Methods and limitations of security policy reconciliation | |
JP5690935B2 (en) | System and method for secure agent information | |
Almenárez et al. | TrustAC: Trust-based access control for pervasive devices | |
Akaichi et al. | Usage control specification, enforcement, and robustness: A survey | |
Preuveneers et al. | Policy reconciliation for access control in dynamic cross-enterprise collaborations | |
Ardagna et al. | Minimising disclosure of client information in credential-based interactions | |
Becker | Cassandra: flexible trust management and its application to electronic health records | |
Mont et al. | EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations | |
Badr et al. | The integration of corporate security strategies in collaborative business processes | |
Yaich | Trust management systems: A retrospective study on digital trust | |
Habiba et al. | A new approach to access control in cloud | |
Sommer et al. | PRIME architecture V3 | |
Runsewe | A policy-based management framework for cloud computing security | |
Imran-Daud | Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud | |
Munakami | Developing an ABAC-based grant proposal workflow management system | |
Lee et al. | Automated trust negotiation in open systems | |
Takabi | A semantic based policy management framework for cloud computing environments | |
Fatema | Adding privacy protection to policy based authorisation systems | |
Zenden | The identity mangement solution that improves data sharing in logistics | |
Jingya | Data centered Usage based Protection in a SMACIT context | |
Jaramillo | A semantic contract model and knowledge-driven process for supporting controllability in service-oriented approaches | |
Zhengqiu et al. | Research of Secure Service Composition Based on Semantic Security Policy | |
Samarati et al. | Final research report on next generation policies | |
Casassa-Mont | Architecture V2 Author: WP 14.2 Editor: Marco Casassa-Mont, Stefano Crosta, Thomas Kriegelstein, Dieter Sommer Reviewers | |
Richter | Practical User Access Control for Large-Scale Companies |