With the rapid growth in the communication technology we are moving towards an era of pervasive computing environment. Access control is very challenging in this environment. The proposed trust based access control scheme is built on the trustworthiness of users. Access control is achieved depending on the trust value evaluated for the request of services. Here, either we are going to have the access in direct or indirect way. The trustworthiness of the user and the recommender are formulated using fuzzy set and fuzzy logic. This scheme differs with respect to the features they provide, and the type of the trust constraints, they support.