Clustering Context Items into User Trust Levels - Publikacja - MOST Wiedzy

Wyszukiwarka

Clustering Context Items into User Trust Levels

Abstrakt

An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy. Based on the user’s current trust level there are extra security mechanisms fired, or not. This approach allows you to reduce the negative effects on the system performance introduced by the security layer without any noticeable decrease in the system security level. There are also some results of such an analysis made on the Gdańsk University of Technology central system discussed.

Cytowania

  • 1

    CrossRef

  • 0

    Web of Science

  • 2

    Scopus

Cytuj jako

Pełna treść

pobierz publikację
pobrano 48 razy
Wersja publikacji
Accepted albo Published Version
Licencja
Copyright (Springer International Publishing Switzerland 2016)

Słowa kluczowe

Informacje szczegółowe

Kategoria:
Aktywność konferencyjna
Typ:
materiały konferencyjne indeksowane w Web of Science
Opublikowano w:
Advances in Intelligent Systems and Computing nr 470, strony 333 - 342,
ISSN: 2194-5357
Tytuł wydania:
11th International Conference on Dependability Engineering and Complex Systems strony 333 - 342
ISSN:
2194-5357
Język:
angielski
Rok wydania:
2016
Opis bibliograficzny:
Lubomski P., Krawczyk H..: Clustering Context Items into User Trust Levels, W: 11th International Conference on Dependability Engineering and Complex Systems, 2016, SPRINGER INT PUBLISHING AG,.
DOI:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1007/978-3-319-39639-2_29
Bibliografia: test
  1. M. Benantar, Access Control Systems. Security, Identity Management and Trust Models. Springer-Verlag, 2006. otwiera się w nowej karcie
  2. E. Bertino, "RBAC models -concepts and trends," Computers & Security, vol. 22, no. 6, pp. 511-514, Sep. 2003. otwiera się w nowej karcie
  3. A. Ricci, M. Viroli, and A. Omicini, "An RBAC Approach for Securing Access Control in a MAS Coordination Infrastructure," in 1st International Workshop "Safety and Security in MultiAgent Systems" (SASEMAS 2004), 2004, pp. 110-124.
  4. R. Bhatti, E. Bertino, and A. Ghafoor, "A Trust-Based Context-Aware Access Control Model for Web-Services," Distributed and Parallel Databases, vol. 18, no. 1, pp. 83-105, Jul. 2005. otwiera się w nowej karcie
  5. M. F. F. Khan and K. Sakamura, "Context-aware access control for clinical information systems," in 2012 International Conference on Innovations in Information Technology (IIT), 2012, pp. 123-128. otwiera się w nowej karcie
  6. H. Krawczyk and P. Lubomski, "CoRBAC -context-oriented security model (in Polish)," Studia Informatica, vol. 34, no. 3, pp. 185-194, 2013.
  7. X. Huang, H. Wang, Z. Chen, and J. Lin, "A Context, Rule and Role-Based Access Control Model In Enterprise Pervasive Computing Environment," in 2006 First International Symposium on Pervasive Computing and Applications, 2006, pp. 497-502. otwiera się w nowej karcie
  8. M. Miettinen and N. Asokan, "Towards security policy decisions based on context profiling," in Proceedings of the 3rd ACM workshop on Artificial intelligence and security -AISec '10, 2010, p. 19. otwiera się w nowej karcie
  9. A. Gupta, M. Miettinen, N. Asokan, and M. Nagy, "Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling" in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, 2012, pp. 471-480. otwiera się w nowej karcie
  10. C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Communications Magazine, vol. 40, no. October, pp. 76-82, 2002. otwiera się w nowej karcie
  11. S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Psaila, and P. Samarati, "Integrating trust management and access control in data-intensive Web applications," ACM Transactions on the Web, vol. 6, no. 2, pp. 1-43, May 2012. otwiera się w nowej karcie
  12. J. W. Woo, M. J. Hwang, C. G. Lee, and H. Y. Youn, "Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent System," 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1121-1126, 2010. otwiera się w nowej karcie
  13. H. Krawczyk and P. Lubomski, "User Trust Levels and Their Impact on System Security and Usability," in Communications in Computer and Information Science, Springer International Publishing, 2015, pp. 82-91. otwiera się w nowej karcie
  14. S. Furnell, "Usability versus complexity -striking the balance in end-user security," Network Security, vol. 2010, no. 12, pp. 13-17, Dec. 2010. otwiera się w nowej karcie
  15. S. P. S. Pahnila, M. S. M. Siponen, and A. M. A. Mahmood, "Employees' Behavior towards IS Security Policy Compliance," 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. otwiera się w nowej karcie
  16. P. Lubomski, "Context in Security of Distributed e-Service Environments," in Proceedings of the Chip to Cloud Security Forum 2014, 2014, p. 18.
  17. P. Lubomski and H. Krawczyk, "Practical evaluation of security mechanisms of Internet systems (in review)," IEEE Security & Privacy Magazine. otwiera się w nowej karcie
  18. R. P. Adams, "Hierarchical Agglomerative Clustering." 2016. otwiera się w nowej karcie
  19. S. P. Borgatti, "How to Explain Hierarchical Clustering," Connections, vol. 17, no. 2, pp. 78-80, 1994. otwiera się w nowej karcie
  20. A. Bouguettaya, Q. Yu, X. Liu, X. Zhou, and A. Song, "Efficient agglomerative hierarchical clustering," Expert Systems with Applications, vol. 42, no. 5, pp. 2785-2797, 2015. otwiera się w nowej karcie
  21. P. Wessa, "Free Statistics Software, Office for Research Development and Education, version 1.1.23-r7," 2016. [Online]. Available: http://www.wessa.net/. otwiera się w nowej karcie
  22. J. a. Hartigan and M. a. Wong, "A K-Means Clustering Algorithm", Journal of the Royal Statistical Society, vol. 28, no. 1, pp. 100-108, 1979. otwiera się w nowej karcie
  23. D. Comaniciu and P. Meer, "Mean shift analysis and applications" in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1197-1203 vol.2. otwiera się w nowej karcie
Weryfikacja:
Politechnika Gdańska

wyświetlono 120 razy

Publikacje, które mogą cię zainteresować

Meta Tagi