By Topic

A trust and reputation-based access control model for virtual organizations

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Arasteh, M. ; Dept. of Comput. Eng., Sharif Univ. of Technol., Tehran, Iran ; Amini, M. ; Jalili, R.

Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control requirements which cannot be satisfied using the traditional access control models. This is basically due to special features of VOs; such as temporality, unknown users, and diverse resources. In this paper, after expressing our assumption on a framework for VOs; the concept of organizational trust and reputation is used to establish an access control model for VOs. Each member of an organization inherits its organizational reputation. Resource providers announce the behavior of their interacting users to their organization manager. According to the received feedbacks, organization managers calculate the new amount of trust for each guest organization. Afterwards, the VO manager calculates organizations reputation by integrating trust values received from organizations. A selfish organization may use the other organization resources and not offer any resources to the requester organizations. To overcome this problem, we use single policy and authorization system for all members of the VO. By combining resource providers' policies, a unique policy for each shared resource in the VO will be formed. In VOs there are various and heterogeneous entities, to address this challenge and preparing common perception we suggest using ontology in the virtual organization. The advantage and usefulness of the proposed method is compared with the conventional approaches.

Published in:

Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on

Date of Conference:

13-14 Sept. 2012