Clustering Context Items into User Trust Levels - Publication - Bridge of Knowledge

Search

Clustering Context Items into User Trust Levels

Abstract

An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy. Based on the user’s current trust level there are extra security mechanisms fired, or not. This approach allows you to reduce the negative effects on the system performance introduced by the security layer without any noticeable decrease in the system security level. There are also some results of such an analysis made on the Gdańsk University of Technology central system discussed.

Citations

  • 1

    CrossRef

  • 0

    Web of Science

  • 2

    Scopus

Cite as

Full text

download paper
downloaded 48 times
Publication version
Accepted or Published Version
License
Copyright (Springer International Publishing Switzerland 2016)

Keywords

Details

Category:
Conference activity
Type:
materiały konferencyjne indeksowane w Web of Science
Published in:
Advances in Intelligent Systems and Computing no. 470, pages 333 - 342,
ISSN: 2194-5357
Title of issue:
11th International Conference on Dependability Engineering and Complex Systems strony 333 - 342
ISSN:
2194-5357
Language:
English
Publication year:
2016
Bibliographic description:
Lubomski P., Krawczyk H..: Clustering Context Items into User Trust Levels, W: 11th International Conference on Dependability Engineering and Complex Systems, 2016, SPRINGER INT PUBLISHING AG,.
DOI:
Digital Object Identifier (open in new tab) 10.1007/978-3-319-39639-2_29
Bibliography: test
  1. M. Benantar, Access Control Systems. Security, Identity Management and Trust Models. Springer-Verlag, 2006. open in new tab
  2. E. Bertino, "RBAC models -concepts and trends," Computers & Security, vol. 22, no. 6, pp. 511-514, Sep. 2003. open in new tab
  3. A. Ricci, M. Viroli, and A. Omicini, "An RBAC Approach for Securing Access Control in a MAS Coordination Infrastructure," in 1st International Workshop "Safety and Security in MultiAgent Systems" (SASEMAS 2004), 2004, pp. 110-124.
  4. R. Bhatti, E. Bertino, and A. Ghafoor, "A Trust-Based Context-Aware Access Control Model for Web-Services," Distributed and Parallel Databases, vol. 18, no. 1, pp. 83-105, Jul. 2005. open in new tab
  5. M. F. F. Khan and K. Sakamura, "Context-aware access control for clinical information systems," in 2012 International Conference on Innovations in Information Technology (IIT), 2012, pp. 123-128. open in new tab
  6. H. Krawczyk and P. Lubomski, "CoRBAC -context-oriented security model (in Polish)," Studia Informatica, vol. 34, no. 3, pp. 185-194, 2013.
  7. X. Huang, H. Wang, Z. Chen, and J. Lin, "A Context, Rule and Role-Based Access Control Model In Enterprise Pervasive Computing Environment," in 2006 First International Symposium on Pervasive Computing and Applications, 2006, pp. 497-502. open in new tab
  8. M. Miettinen and N. Asokan, "Towards security policy decisions based on context profiling," in Proceedings of the 3rd ACM workshop on Artificial intelligence and security -AISec '10, 2010, p. 19. open in new tab
  9. A. Gupta, M. Miettinen, N. Asokan, and M. Nagy, "Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling" in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, 2012, pp. 471-480. open in new tab
  10. C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Communications Magazine, vol. 40, no. October, pp. 76-82, 2002. open in new tab
  11. S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Psaila, and P. Samarati, "Integrating trust management and access control in data-intensive Web applications," ACM Transactions on the Web, vol. 6, no. 2, pp. 1-43, May 2012. open in new tab
  12. J. W. Woo, M. J. Hwang, C. G. Lee, and H. Y. Youn, "Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System," 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1121-1126, 2010. open in new tab
  13. H. Krawczyk and P. Lubomski, "User Trust Levels and Their Impact on System Security and Usability," in Communications in Computer and Information Science, Springer International Publishing, 2015, pp. 82-91. open in new tab
  14. S. Furnell, "Usability versus complexity -striking the balance in end-user security," Network Security, vol. 2010, no. 12, pp. 13-17, Dec. 2010. open in new tab
  15. S. P. S. Pahnila, M. S. M. Siponen, and A. M. A. Mahmood, "Employees' Behavior towards IS Security Policy Compliance," 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. open in new tab
  16. P. Lubomski, "Context in Security of Distributed e-Service Environments," in Proceedings of the Chip to Cloud Security Forum 2014, 2014, p. 18.
  17. P. Lubomski and H. Krawczyk, "Practical evaluation of security mechanisms of Internet systems (in review)," IEEE Security & Privacy Magazine. open in new tab
  18. R. P. Adams, "Hierarchical Agglomerative Clustering." 2016. open in new tab
  19. S. P. Borgatti, "How to Explain Hierarchical Clustering," Connections, vol. 17, no. 2, pp. 78-80, 1994. open in new tab
  20. A. Bouguettaya, Q. Yu, X. Liu, X. Zhou, and A. Song, "Efficient agglomerative hierarchical clustering," Expert Systems with Applications, vol. 42, no. 5, pp. 2785-2797, 2015. open in new tab
  21. P. Wessa, "Free Statistics Software, Office for Research Development and Education, version 1.1.23-r7," 2016. [Online]. Available: http://www.wessa.net/. open in new tab
  22. J. a. Hartigan and M. a. Wong, "A K-Means Clustering Algorithm", Journal of the Royal Statistical Society, vol. 28, no. 1, pp. 100-108, 1979. open in new tab
  23. D. Comaniciu and P. Meer, "Mean shift analysis and applications" in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1197-1203 vol.2. open in new tab
Verified by:
Gdańsk University of Technology

seen 120 times

Recommended for you

Meta Tags