You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
  • Article
  • Open Access

25 December 2025

Adaptive Trust-Based Access Control with Honey Objects and Behavior Analysis

and
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11432, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Section Computing and Artificial Intelligence

Abstract

In recent years, the number of interconnected computers and resources has increased drastically. To ensure the privacy of these resources, a secure access control mechanism must be implemented. Traditional access control models lack adequate emergency handling. Threshold-based collaborative access control (T-CAC) addresses the issue of handling emergencies without overriding the access control model by shifting trust from individuals to groups, thereby enforcing collaboration among different actors. Given the risks associated with improper and uncontrolled delegation of authority, along with the need to enforce the zero-trust principle of continuous verification, this study proposes a secure and adaptable model, Adaptive Trust-Based Access Control with Honey Objects and Behavior Analysis (ATACHOBA). It enables user delegation based on both trust and behavior analyses. In the proposed model, access decisions are determined by trust values and recommendations provided by the machine learning algorithm. ATACHOBA imposes penalties for any abnormal or malicious activity. Moreover, it utilizes honey objects and honey requests to ensure appropriate user behavior.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.