Role-based Trust Assignment in Trust Management Systems

Dongwan Shin, Gail Joon Ahn

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Roles canbe a convenient construct for expressing the degree of trust between entities, based upon which further specification of responsibility and capability is made. Traditional role-based access control (RBAC) models, however, lack to support such a trust-relevant aspect of roles. In this paper, we describe the motivation and formal definition of a trust-enabled RBAC called TRUSTr. TRUSTr introduces a new component called trust assignment (TA). TA features trust-based cross-domain role association and supports entrusting or distrusting operations for the management of associated roles. By using Weeks' least fixpoint approach, we also discuss a feasible scheme for implementing TRUSTr.

Original languageEnglish (US)
Title of host publication17th ISCA International Conference on Parallel and Distributed Computing Systems 2004, PDCS 2004
EditorsDavid A. Bader, Ashfaq A. Khokhar
PublisherInternational Society for Computers and Their Applications (ISCA)
Pages551-558
Number of pages8
ISBN (Electronic)9781618398185
StatePublished - 2004
Externally publishedYes
Event17th International Conference on Parallel and Distributed Computing Systems, PDCS 2004 - San Francisco, United States
Duration: Sep 15 2004Sep 17 2004

Publication series

Name17th ISCA International Conference on Parallel and Distributed Computing Systems 2004, PDCS 2004

Conference

Conference17th International Conference on Parallel and Distributed Computing Systems, PDCS 2004
Country/TerritoryUnited States
CitySan Francisco
Period9/15/049/17/04

Keywords

  • Role-based access control
  • role association
  • trust assignment
  • trust management

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Role-based Trust Assignment in Trust Management Systems'. Together they form a unique fingerprint.

Cite this