Title | ||
---|---|---|
Modeling interaction using trust and recommendation in ubiquitous computing enivornment. |
Abstract | ||
---|---|---|
To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. X-bar control chart is used to handle malicious recommendation. The defense mechanisms incorporated by proposed model against attacks such as bad mouthing attack, oscillating behavior attack and conflicting behavior attack are also demonstrated. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1186/1687-1499-2012-119 | EURASIP J. Wireless Comm. and Networking |
Keywords | Field | DocType |
Security Level, Service Interface, Access Control Model, Initial Trust, Lower Control Limit | Behavioral pattern,Secure computing,Security level,Computer security,Computer science,Computer network,Control chart,Access control,Ubiquitous computing,Cognition | Journal |
Volume | Issue | ISSN |
2012 | 1 | 1687-1499 |
Citations | PageRank | References |
1 | 0.36 | 19 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Naima Iltaf | 1 | 42 | 7.64 |
Abdul Ghafoor | 2 | 179 | 40.85 |
Mukhtar Hussain | 3 | 23 | 5.32 |