Trust based access control in infrastructure-centric environment

Ran Yang*, Chuang Lin, Yixin Jiang, Xiaowen CHU

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

14 Citations (Scopus)


The rapid development of applications running on global information infrastructure poses the problem of securing information sharing among domain collaborations. Existing access control models are defective in dynamic authorization based on user's trustworthiness and do not take full advantages of the infrastructure in implementing access control system. In this work, we propose a trust and role based access control model and the corresponding framework in infrastructure-centric environment. With the extension to RBAC model, trust level requirements, which dictate that the roles in the privilege context must be activated by the trustworthy user, can be specified. The comprehensive trust model, which calculates the user's trust level in multiple trust contexts based on behavior histories, is proposed. Moreover, by taking advantages of the infrastructure services, our scheme is flexible and scalable in that system administrators are free to choose custom scoring functions while the infrastructure trust evaluation services are relieved of the heavy burdens of history record maintenance and trust level update.

Original languageEnglish
Title of host publication2011 IEEE International Conference on Communications, ICC 2011
Publication statusPublished - 2011
Event2011 IEEE International Conference on Communications, ICC 2011 - Kyoto, Japan
Duration: 5 Jun 20119 Jun 2011

Publication series

NameIEEE International Conference on Communications
ISSN (Print)0536-1486


Conference2011 IEEE International Conference on Communications, ICC 2011

Scopus Subject Areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

User-Defined Keywords

  • access control
  • infrastructure-centric
  • trust model


Dive into the research topics of 'Trust based access control in infrastructure-centric environment'. Together they form a unique fingerprint.

Cite this