Skip to main content

Clustering Context Items into User Trust Levels

  • Conference paper
  • First Online:
Dependability Engineering and Complex Systems (DepCoS-RELCOMEX 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 470))

Included in the following conference series:

Abstract

An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy. Based on the user’s current trust level there are extra security mechanisms fired, or not. This approach allows you to reduce the negative effects on the system performance introduced by the security layer without any noticeable decrease in the system security level. There are also some results of such an analysis made on the Gdańsk University of Technology central system discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Benantar, M.: Access control systems. In: Security, Identity Management and Trust Models. Springer (2006)

    Google Scholar 

  2. Bertino, E.: RBAC models—concepts and trends. Comput. Secur. 22(6), 511–514 (2003)

    Article  MathSciNet  Google Scholar 

  3. Ricci, A., Viroli, M., Omicini, A.: An RBAC approach for securing access control in a mas coordination infrastructure. In: 1st International Workshop Safety and Security in MultiAgent Systems (SASEMAS 2004), pp. 110–124 (2004)

    Google Scholar 

  4. Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases 18(1), 83–105 (2005)

    Article  Google Scholar 

  5. Khan, M.F.F., Sakamura, K.: Context-aware access control for clinical information systems. In: 2012 International Conference on Innovations in Information Technology (IIT), pp. 123–128 (2012)

    Google Scholar 

  6. Krawczyk, H., Lubomski, P.: CoRBAC—context-oriented security model (in Polish). Studia Informatica 34(3), 185–194 (2013)

    Google Scholar 

  7. Huang, X., Wang, H., Chen, Z., Lin, J.: A context, rule and role-based access control model in enterprise pervasive computing environment. In: 2006 First International Symposium on Pervasive Computing and Applications, pp. 497–502 (2006)

    Google Scholar 

  8. Miettinen, M., Asokan, N.: Towards security policy decisions based on context profiling. In: Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security—AISec’10, p. 19 (2010)

    Google Scholar 

  9. Gupta, A., Miettinen, M., Asokan, N., Nagy, M.: Intuitive security policy configuration in mobile devices using context profiling. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 471–480 (2012)

    Google Scholar 

  10. Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun. Mag. 40(October), 76–82 (2002)

    Article  Google Scholar 

  11. De Capitani Di, S., Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, G.Psaila, Samarati, P.: Integrating trust management and access control in data-intensive Web applications. ACM Trans. Web 6(2), 1–43 (2012)

    Google Scholar 

  12. Woo, J.W., Hwang, M.J., Lee, C.G., Youn, H.Y.: Dynamic role-based access control with trust-satisfaction and reputation for multi-agent system. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp. 1121–1126 (2010)

    Google Scholar 

  13. Krawczyk, H., Lubomski, P.: User trust levels and their impact on system security and usability. In: Communications in Computer and Information Science. Springer International Publishing, pp. 82–91 (2015)

    Google Scholar 

  14. Furnell, S.: Usability versus complexity—striking the balance in end-user security. Netw. Secur. 2010(12), 13–17 (2010)

    Article  Google Scholar 

  15. Pahnila, S.P.S., Siponen, M.S.M., Mahmood, A.M.A.: Employees’ behavior towards IS security policy compliance. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07) (2007)

    Google Scholar 

  16. Lubomski, P.: Context in security of distributed e-service environments. In: Proceedings of the Chip to Cloud Security Forum 2014, p. 18 (2014)

    Google Scholar 

  17. Lubomski, P., Krawczyk, H.: Practical evaluation of security mechanisms of Internet systems (in review). IEEE Secur. Privacy Mag.

    Google Scholar 

  18. Adams, R.P.: Hierarchical Agglomerative Clustering (2016)

    Google Scholar 

  19. Borgatti, S.P.: How to explain hierarchical clustering. Connections 17(2), 78–80 (1994)

    Google Scholar 

  20. Bouguettaya, A., Yu, Q., Liu, X., Zhou, X., Song, A.: Efficient agglomerative hierarchical clustering. Expert Syst. Appl. 42(5), 2785–2797 (2015)

    Article  Google Scholar 

  21. Wessa, P.: Free statistics software, office for research development and education version 1.1.23-r7, 2016. http://www.wessa.net/

  22. Hartigan, J.A., Wong, M.A.: A K-Means clustering algorithm. J. Roy. Stat. Soc. 28(1), 100–108 (1979)

    Google Scholar 

  23. Comaniciu, D., Meer, P.: Mean shift analysis and applications. In: Proceedings of the Seventh IEEE International Conference on Computer Vision, vol. 2, pp. 1197–1203 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paweł Lubomski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Lubomski, P., Krawczyk, H. (2016). Clustering Context Items into User Trust Levels. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Dependability Engineering and Complex Systems. DepCoS-RELCOMEX 2016. Advances in Intelligent Systems and Computing, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-319-39639-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39639-2_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39638-5

  • Online ISBN: 978-3-319-39639-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics