ASITL: Adaptive Secure Interoperation Using Trust-Level

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The development of network and distributed computing has aroused more and more information exchange between far away servers and clients. Many traditional access control systems based on certificates or predefined access control policies are insufficient to deal with abnormal access requests or hidden intrusions. A flexible and efficient mechanism is needed to support open authentication and secure interoperations. In this paper, we address this issue by proposing an Adaptive Secure Interoperation system using Trust-Level (ASITL), which involves a statistical learning algorithm to judge an access request event, an adaptive calculating algorithm to dynamically adjust a user's trust-level and a self-protecting mechanism to prevent the system from potential risks. In particular, we also presented examples to demonstrate the secure working flow of ASITL. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Jin, L., & Lu, Z. (2007). ASITL: Adaptive Secure Interoperation Using Trust-Level. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4430 LNCS, pp. 117–128). Springer Verlag. https://doi.org/10.1007/978-3-540-71549-8_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free