Improving Negotiation Efficiency and Success in Automated Trust Negotiation

被引:0
作者
Lu, Hongwei [1 ]
Liu, Bailing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Peoples R China
来源
SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS | 2008年
关键词
D O I
10.1109/SITIS.2007.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers by gradually requesting and disclosing digitally signed credentials. Previous work on ATN mainly focuses on how to protect sensitive information about negotiators. However the efficiency and success, which are primary goals of ATN, are not sufficiently considered. In this paper we extend existing policy languages by adding two basic and expressive operators to them, which is one key to improve negotiation efficiency. Several problems that can not be effectively solved using traditional policy languages are presented, they can be effectively and efficiently settled by the extended policy languages, and several examples are also given. Furthermore, we develop an associated protocol taking advantages of oblivious signature based envelope (OSBE) and two new concepts explored in this paper We also prove that the extended policy languages and the associated protocol together greatly improve negotiation efficiency and success under some conditions without sensitive information leakage in ATN.
引用
收藏
页码:442 / 449
页数:8
相关论文
共 31 条
[1]  
[Anonymous], **DROPPED REF**
[2]  
[Anonymous], 2704 IETF RFC
[3]   X-TNL:: An XML-based language for trust negotiations [J].
Bertino, E ;
Ferrari, E ;
Squicciarini, A .
IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :81-84
[4]  
Bertino E., 2001, P ACM SIGMOD C, P36
[5]  
BERTINO E, 2001, P 6 ACM SACMAT, P18
[6]  
BONATTI P, 2000, P 7 ACM C COMP COMM, P78
[7]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[8]  
Camenisch J, 2002, P 9 ACM C COMPUTER C, P21
[9]   Access control meets public key infrastructure, or: Assigning roles to strangers [J].
Herzberg, A ;
Mass, Y ;
Mihaeli, J ;
Naor, D ;
Ravid, Y .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :2-14
[10]  
HESS A, 2002, NETW DISTR SYST SEC, P203