An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing

نویسنده

  • Danfeng Yao
چکیده

Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control mechanisms are too rigid for information sharing. There is an increasing need to secure the information collected from the pervasive computing environments, and yet to be able to allow flexible data sharing to facilitate problem-solving and decisionmaking. Our work investigates the two seemingly contradictory factors, secure access and flexible adaptation, and designs a trust inference model for emergency and crisis situations. We describe an ad hoc trust inference model where access decisions are adaptive to the identity, history, and environment of a requester, for example, the degree of urgency. Our trust inference model is built on fuzzy logic. Our sharing control mechanism can also be applied to protect personal data and used for digital identity protection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model for Evaluating Knowledge Sharing Using Fuzzy Inference System (Case Study: Tehran Municipality ICT Organization)

The present paper aimed at developing an approach based on Fuzzy Inference System (FIS) for measuring of knowledge sharing in the organization. In recent years there has been increasing interest in the knowledge sharing by experts and managers in the world, according to increasing importance of knowledge as the key source of competitive advantage, organizations have made serious effort to find ...

متن کامل

Policy-driven role-based access management for ad-hoc collaboration

Ad-hoc collaboration is a newly emerged environment enabling distributed collaborators to share resources. The dynamic nature and unique sharing pattern in ad-hoc collaboration poses great challenges for security services to accommodate both access control and trust management requirements in providing controlled resource sharing. In this paper, we propose a comprehensive, integrated and implem...

متن کامل

Some relationships between two trust management languages

In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...

متن کامل

Enforce Cooperative Resource Sharing in Untrusted Peer-to-Peer Computing Environment

Peer-to-Peer (P2P) computing is widely recognized as a promising paradigm for building next generation distributed applications, ranging from large scale scientific applications to mobile ad hoc information sharing, by federating dispersed pools of geographically distributed resources under loosely coordinated control. However, the autonomous, heterogeneous, and decentralized nature of particip...

متن کامل

A Review on Trust Model in Vehicular Ad Hoc Network

In vehicular ad hoc network (VANETs), the applications mainly focused on the road and making their journey safe and comfortable to fulfill the users’ requirements. It is a challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008