An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
نویسنده
چکیده
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control mechanisms are too rigid for information sharing. There is an increasing need to secure the information collected from the pervasive computing environments, and yet to be able to allow flexible data sharing to facilitate problem-solving and decisionmaking. Our work investigates the two seemingly contradictory factors, secure access and flexible adaptation, and designs a trust inference model for emergency and crisis situations. We describe an ad hoc trust inference model where access decisions are adaptive to the identity, history, and environment of a requester, for example, the degree of urgency. Our trust inference model is built on fuzzy logic. Our sharing control mechanism can also be applied to protect personal data and used for digital identity protection.
منابع مشابه
A Model for Evaluating Knowledge Sharing Using Fuzzy Inference System (Case Study: Tehran Municipality ICT Organization)
The present paper aimed at developing an approach based on Fuzzy Inference System (FIS) for measuring of knowledge sharing in the organization. In recent years there has been increasing interest in the knowledge sharing by experts and managers in the world, according to increasing importance of knowledge as the key source of competitive advantage, organizations have made serious effort to find ...
متن کاملPolicy-driven role-based access management for ad-hoc collaboration
Ad-hoc collaboration is a newly emerged environment enabling distributed collaborators to share resources. The dynamic nature and unique sharing pattern in ad-hoc collaboration poses great challenges for security services to accommodate both access control and trust management requirements in providing controlled resource sharing. In this paper, we propose a comprehensive, integrated and implem...
متن کاملSome relationships between two trust management languages
In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...
متن کاملEnforce Cooperative Resource Sharing in Untrusted Peer-to-Peer Computing Environment
Peer-to-Peer (P2P) computing is widely recognized as a promising paradigm for building next generation distributed applications, ranging from large scale scientific applications to mobile ad hoc information sharing, by federating dispersed pools of geographically distributed resources under loosely coordinated control. However, the autonomous, heterogeneous, and decentralized nature of particip...
متن کاملA Review on Trust Model in Vehicular Ad Hoc Network
In vehicular ad hoc network (VANETs), the applications mainly focused on the road and making their journey safe and comfortable to fulfill the users’ requirements. It is a challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008