PapersFlow Research Brief

Social Sciences · Social Sciences

Access Control and Trust
Research Guide

What is Access Control and Trust?

Access Control and Trust is a research cluster examining trust and reputation systems, role-based access control, and security mechanisms in online environments including P2P networks and electronic communities.

This field covers trust management, reputation models, access control policies, and their applications in semantic web and multi-agent systems, with 37,601 works published. Role-based access control (RBAC) simplifies security administration in large systems, as outlined in foundational models. Trust systems address challenges in P2P networks by evaluating peer reliability through algorithms like Eigentrust.

Topic Hierarchy

100%
graph TD D["Social Sciences"] F["Social Sciences"] S["Sociology and Political Science"] T["Access Control and Trust"] D --> F F --> S S --> T style T fill:#DC5238,stroke:#c4452e,stroke-width:2px
Scroll to zoom • Drag to pan
37.6K
Papers
N/A
5yr Growth
322.4K
Total Citations

Research Sub-Topics

Why It Matters

Access control and trust mechanisms enable secure management of information in distributed systems. In P2P networks, the Eigentrust algorithm by Kamvar et al. (2003) combats inauthentic file spread by computing reputation scores from peer feedback, supporting reliable file-sharing with 3332 citations. RBAC models by Sandhu et al. (1996) reduce administrative complexity in large-scale systems, influencing NIST standards proposed by Ferraiolo et al. (2001) with 2496 citations for standardized authorization. These approaches underpin security in cloud computing, as addressed by Zissis and Lekkas (2010) with 1821 citations, and reputation-based trust in P2P communities via PeerTrust by Xiong and Liu (2004) with 1772 citations.

Reading Guide

Where to Start

"Not So Different After All: A Cross-Discipline View Of Trust" by Rousseau et al. (1998), as it provides a foundational, accessible analysis of trust definitions across disciplines, essential before diving into technical access control.

Key Papers Explained

Rousseau et al. (1998) "Not So Different After All: A Cross-Discipline View Of Trust" establishes core trust concepts, which Sandhu et al. (1996) "Role-based access control models" applies to computational security through RBAC frameworks. Ferraiolo et al. (2001) "Proposed NIST standard for role-based access control" standardizes these models for practical deployment. Kamvar et al. (2003) "The Eigentrust algorithm for reputation management in P2P networks" extends trust to P2P via algorithmic reputation, complemented by Xiong and Liu (2004) "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities" with contextual enhancements.

Paper Timeline

100%
graph LR P0["Security Policies and Security M...
1982 · 2.1K cites"] P1["Role-based access control models
1996 · 5.7K cites"] P2["Swift Trust and Temporary Groups
1996 · 1.9K cites"] P3["Not So Different After All: A Cr...
1998 · 9.9K cites"] P4["Proposed NIST standard for role-...
2001 · 2.5K cites"] P5["The Eigentrust algorithm for rep...
2003 · 3.3K cites"] P6["A survey of trust and reputation...
2005 · 3.3K cites"] P0 --> P1 P1 --> P2 P2 --> P3 P3 --> P4 P4 --> P5 P5 --> P6 style P3 fill:#DC5238,stroke:#c4452e,stroke-width:2px
Scroll to zoom • Drag to pan

Most-cited paper highlighted in red. Papers ordered chronologically.

Advanced Directions

Research builds on RBAC standards and P2P trust algorithms, with applications to cloud security as in Zissis and Lekkas (2010) "Addressing cloud computing security issues". Jøsang et al. (2005) "A survey of trust and reputation systems for online service provision" synthesizes ongoing developments in service-oriented trust.

Papers at a Glance

# Paper Year Venue Citations Open Access
1 Not So Different After All: A Cross-Discipline View Of Trust 1998 Academy of Management ... 9.9K
2 Role-based access control models 1996 Computer 5.7K
3 The Eigentrust algorithm for reputation management in P2P netw... 2003 3.3K
4 A survey of trust and reputation systems for online service pr... 2005 Decision Support Systems 3.3K
5 Proposed NIST standard for role-based access control 2001 ACM Transactions on In... 2.5K
6 Security Policies and Security Models 1982 2.1K
7 Swift Trust and Temporary Groups 1996 1.9K
8 Addressing cloud computing security issues 2010 Future Generation Comp... 1.8K
9 Role-Based Access Control 2002 Elsevier eBooks 1.8K
10 PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer ... 2004 IEEE Transactions on K... 1.8K

Frequently Asked Questions

What is role-based access control?

Role-based access control (RBAC) simplifies security administration by assigning permissions to roles rather than individual users. Sandhu et al. (1996) describe four reference models for RBAC, which received renewed attention for large systems. Ferraiolo et al. (2001) proposed NIST standards building on these models for consistent authorization management.

How does the Eigentrust algorithm work in P2P networks?

The Eigentrust algorithm computes a global reputation score for peers using local trust values derived from interaction history. Kamvar et al. (2003) developed it to detect and mitigate inauthentic files in open P2P file-sharing networks. It leverages eigenvector centrality to aggregate trustworthy peer opinions.

What are key trust models in online communities?

Trust models in online service provision include reputation systems that aggregate feedback for reliability assessment. Jøsang et al. (2005) surveyed these systems, highlighting their role in decision support. PeerTrust by Xiong and Liu (2004) supports reputation-based trust in P2P electronic communities through contextual factors like transaction scope.

Why is multidisciplinary trust research important?

Multidisciplinary views unify trust definitions across fields like psychology and economics. Rousseau et al. (1998) analyzed trust as cause, effect, or moderator in organizational contexts, cited 9865 times. This cross-discipline perspective aids consistent application in security and social systems.

What is swift trust in temporary groups?

Swift trust emerges in temporary groups through quick provisional acceptance based on categories and roles. Meyerson et al. (1996) examined it in high-velocity environments like project teams. It differs from chronic trust by relying on real-time cues rather than long-term history.

How do security policies relate to access control?

Security policies define restrictions on information access, modification, or deletion in computer systems. Goguen and Meseguer (1982) formalized models for policy specification and verification. These foundations support RBAC implementations in modern environments.

Open Research Questions

  • ? How can trust models integrate multidisciplinary definitions for consistent application across organizational and computational systems?
  • ? What metrics best capture interaction context in P2P reputation systems to improve accuracy over eigenvector-based methods?
  • ? How do role hierarchies in RBAC scale to dynamic environments like cloud computing without increasing administrative overhead?
  • ? In what ways can swift trust principles extend to automated multi-agent systems for rapid security policy negotiation?
  • ? Which policy specification languages most effectively enforce security models in semantic web applications?

Research Access Control and Trust with AI

PapersFlow provides specialized AI tools for Social Sciences researchers. Here are the most relevant for this topic:

See how researchers in Social Sciences use PapersFlow

Field-specific workflows, example queries, and use cases.

Social Sciences Guide

Start Researching Access Control and Trust with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Social Sciences researchers