Research on automated trust negotiation

被引:10
作者
School of Computer Science, Beihang University, Beijing 100083, China [1 ]
机构
[1] School of Computer Science, Beihang University
来源
Ruan Jian Xue Bao | 2006年 / 1卷 / 124-133期
关键词
Access control policy; Credential; Information security; Negotiation strategy; Trust negotiation;
D O I
10.1360/jos170124
中图分类号
学科分类号
摘要
The proliferation of the Internet has given opportunities on different entities to share resources or conduct business transactions. However, how to establish trust among strangers without prior relationship and common security domain poses much difficulty for these activities. To resolve these problems, a promising approach known as Automated Trust Negotiation (ATN), which establishes the trust between strangers with iterative disclosure of credentials and access control policies, is proposed. In this paper, a comprehensive survey of research on ATN is presented, and some basic techniques, e.g. negotiation model and architecture, access control policy specification, credential description and credential chain discovery, are introduced and compared. Then based on the analysis of the shortcomings and problems of the techniques, the trend of research and application is discussed. All these work may contribute to the further work on trust establishment for entities with privacy protection and autonomy in open Internet.
引用
收藏
页码:124 / 133
页数:9
相关论文
共 31 条
  • [1] Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proc. of the 1996 IEEE Symp. on Security and Privacy, pp. 164-173, (1996)
  • [2] Xu F., Lu J., Research and development of trust management in Web security, Journal of Software, 13, 11, pp. 2057-2064, (2002)
  • [3] Winsborough W.H., Seamons K.E., Jones V.E., Automated trust negotiation, DARPA Information Survivability Conf. and Exposition, pp. 88-102, (2000)
  • [4] Johnson W., Mudumbai S., Thompson M., Authorization and attribute certificates for widely distributed access control, IEEE Proc. of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 340-345, (1998)
  • [5] Li N.H., Mitchell J.C., Winsborough W.H., Design of a role-based trust management framework, Proc. of the 2002 IEEE Symp. on Security and Privacy, pp. 114-130, (2002)
  • [6] Li N.H., Winsborough W.H., Mitchell J.C., Distributed credential chain discovery in trust management, Proc. of the 8th ACM Conf. on Computer and Communications Security, pp. 156-165, (2001)
  • [7] Barlow T., Hess A., Seamons K.E., Trust negotiation in electronic markets, Proc. of 8th Research Symp. in Emerging Electronic Markets, (2001)
  • [8] Seamons K.E., Winslett M., Yu T., Limiting the disclosure of access control policies during automated trust negotiation, Network and Distributed System Security Symp. (NDSS 2001), (2001)
  • [9] Seamons K.E., Winslett M., Yu T., Yu L., Jarvis R., Protecting privacy during on-line trust negotiation, Proc. of the 2nd Workshop on Privacy Enhancing Technologies, pp. 129-143, (2003)
  • [10] Smith B., Seamons K.E., Jones M.D., Responding to policies at runtime in TrustBuilder, Proc. of the 5th Int'l Workshop on Policies for Distributed Systems and Networks, pp. 149-158, (2004)