Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation

 
: Ahadipour, A.; Schanzenbach, M.

:

Institute of Electrical and Electronics Engineers -IEEE-:
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 : 1-4 August 2017, Sydney, Australia : proceedings
Piscataway, NJ: IEEE, 2017
ISBN: 978-1-5090-4906-6
ISBN: 978-1-5090-4905-9
ISBN: 978-1-5090-4907-3
S.1016-1023
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>
International Conference on Big Data Science and Engineering (BigDataSE) <11, 2017, Sydney>
International Conference on Embedded Software and Systems (ICESS) <14, 2017, Sydney>
Englisch
Konferenzbeitrag
Fraunhofer AISEC ()

Abstract
In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as entities, certificates, credentials, policies and trust values are dynamic and constantly changing. Thus, access control models and trust approaches are necessary to support the dynamic and distributed features of such systems and their components. The objective of this paper is to present a comprehensive survey about the security research in distributed systems. We have reviewed the dynamic and distributed nature of the components and evaluation methods of major authorization systems and access control models in existing literature. Based on this overview, we present a survey of selected trust schemes. We provide a categorization for recommendation-based and reputation-based trust models based on trust evaluation. Additionally, we use credential or certifica te storage and chain discovery methods for categorizing evidencebased and policy-based trust models. This work can be used as a reference guide to understand authorization and trust management and to further research fully decentralized and distributed authorization systems.

: http://publica.fraunhofer.de/dokumente/N-473777.html