{"id":"https://openalex.org/W2022036778","doi":"https://doi.org/10.1145/1133058.1133067","title":"TrustBAC","display_name":"TrustBAC","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W2022036778","doi":"https://doi.org/10.1145/1133058.1133067","mag":"2022036778"},"language":"en","primary_location":{"id":"doi:10.1145/1133058.1133067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1133058.1133067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eleventh ACM symposium on Access control models and technologies  - SACMAT '06","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045762965","display_name":"Sudip Chakraborty","orcid":"https://orcid.org/0000-0002-1752-4682"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sudip Chakraborty","raw_affiliation_strings":["Colorado State University, Fort Collins, CO","Colorado State University, Fort Collins, CO;"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO","institution_ids":["https://openalex.org/I92446798"]},{"raw_affiliation_string":"Colorado State University, Fort Collins, CO;","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102938076","display_name":"Indrajit Ray","orcid":"https://orcid.org/0000-0002-3612-7738"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrajit Ray","raw_affiliation_strings":["Colorado State University, Fort Collins, CO","Colorado State University, Fort Collins, CO;"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO","institution_ids":["https://openalex.org/I92446798"]},{"raw_affiliation_string":"Colorado State University, Fort Collins, CO;","institution_ids":["https://openalex.org/I92446798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045762965"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":41.4862,"has_fulltext":false,"cited_by_count":212,"citation_normalized_percentile":{"value":0.99751768,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.9813255071640015},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7940590381622314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7769622802734375},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.45074254274368286},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4374052584171295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39076322317123413}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.9813255071640015},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7940590381622314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7769622802734375},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.45074254274368286},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4374052584171295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39076322317123413},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1133058.1133067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1133058.1133067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eleventh ACM symposium on Access control models and technologies  - SACMAT '06","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1574845526","https://openalex.org/W1602828133","https://openalex.org/W1625130424","https://openalex.org/W1958859150","https://openalex.org/W1968556863","https://openalex.org/W1969965528","https://openalex.org/W1990719527","https://openalex.org/W2000757205","https://openalex.org/W2003513747","https://openalex.org/W2045911778","https://openalex.org/W2052573228","https://openalex.org/W2063838657","https://openalex.org/W2076617786","https://openalex.org/W2091478576","https://openalex.org/W2095742218","https://openalex.org/W2123479684","https://openalex.org/W2131020277","https://openalex.org/W2132819770","https://openalex.org/W2141696417","https://openalex.org/W2149262924","https://openalex.org/W2154765153","https://openalex.org/W2156245716","https://openalex.org/W2158192556","https://openalex.org/W2164396200","https://openalex.org/W2165878764","https://openalex.org/W2166602595","https://openalex.org/W2170496240","https://openalex.org/W2170557676","https://openalex.org/W2176851475","https://openalex.org/W3102845218","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W1986630940","https://openalex.org/W1859642347","https://openalex.org/W2186398450","https://openalex.org/W3115858616","https://openalex.org/W2369414339","https://openalex.org/W4392576316","https://openalex.org/W1577059718"],"abstract_inverted_index":{"Conventional":[0],"access":[1,7,47,56,110,121,166,179,185],"control":[2,48,57,111,122,180,186],"are":[3,38,130,153,158],"suitable":[4],"for":[5,20],"regulating":[6],"to":[8,17,91,132,155,160],"resources":[9],"by":[10,58,69],"known":[11,40],"users.However,these":[12],"models":[13,86],"have":[14,87],"often":[15],"found":[16,90],"be":[18,92],"inadequate":[19],"open":[21],"and":[22,32,182],"decentralized":[23],"multi-centric":[24],"systems":[25,54],"where":[26],"the":[27,33,100,117,125,172,176],"user":[28,66,145],"population":[29],"is":[30,67,78],"dynamic":[31],"identity":[34],"of":[35,63,71,74,95,102,127,136,142,174],"all":[36],"users":[37],"not":[39],"in":[41,163],"advance.For":[42],"such":[43],"systems,":[44],"credential":[45,84,183],"based":[46,53,85,109,120,138,165,178,184],"has":[49],"been":[50,89],"proposed.":[51],"Credential":[52],"achieve":[55],"implementing":[59],"a":[60,65,107,140],"binary":[61],"notion":[62,101,126],"trust.If":[64],"trusted":[68],"virtue":[70],"successful":[72],"evaluation":[73],"its":[75],"credentials":[76],"it":[77],"allowed":[79],"access,":[80],"otherwise":[81],"not.":[82],"However,such":[83],"also":[88],"lacking":[93],"because":[94],"certain":[96],"inherent":[97],"drawbacks":[98],"with":[99,124],"credentials.In":[103],"this":[104],"work,we":[105],"propose":[106],"trust":[108,128,133],"model":[112,123,169,181],"called":[113],"TrustBAC.":[114],"It":[115],"extends":[116],"conventional":[118],"role":[119,164,177],"levels.Users":[129],"assigned":[131,154,159],"levels":[134,152],"instead":[135],"roles":[137,156],"on":[139],"number":[141],"factors":[143],"like":[144],"credentials,user":[146],"behavior":[147],"history,user":[148],"recommendation":[149],"etc.":[150],"Trust":[151],"which":[157],"permissions":[161],"as":[162],"control.The":[167],"TrustBAC":[168],"thus":[170],"incorporates":[171],"advantages":[173],"both":[175],"models.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":18},{"year":2013,"cited_by_count":24},{"year":2012,"cited_by_count":20}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2016-06-24T00:00:00"}
