By Topic

Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)

The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as well as unknown users from foreign sites. We present a solution based on trust propagation. A recommendation from one site to another about the trustworthiness of an entity is the basis of trust propagation. An issue that we identify with this technique is that since the perception of trustworthiness is subjective, the meaning of a trust recommendation from one site to another may get misinterpreted. The result of such misinterpretations would be inaccurate trust propagation and hence inaccurate access control. Thus the second challenge that we address is how to use trust propagation without the negative effect of subjectivity. We use a method for eliminating subjectivity from trust recommendations which relies on the notion of percentiles. We illustrate the problem and the advantage of our access control model with the help of examples.

Published in:

Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on  (Volume:2 )

Date of Conference:

17-20 Dec. 2008