Loading...
Please wait, while we are loading the content...
Similar Documents
The Traust authorization service (2007)
| Content Provider | CiteSeerX |
|---|---|
| Author | Lee, Adam J. Winslett, Marianne Basney, Jim Welch, Von |
| Description | Of 5 Research Statement In recent years, trust negotiation has been proposed as a novel authorization solution for use in open-system environments, in which resources are shared across organizational boundaries. Researchers have shown that trust negotiation is indeed a viable solution for these environments by developing a number of policy languages and strategies for trust negotiation that have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype trust negotiation systems, thereby illustrating the utility of trust negotiation. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process that can hinder the adoption of this promising technology. In this paper, we present Traust, a third-party authorization service that leverages the strengths of existing prototype trust negotiation systems. Traust acts as an authorization broker that issues access tokens for resources in an open system after entities use trust negotiation to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this flexibility paves the way for the incremental adoption of trust negotiation technologies without requiring widespread software or protocol upgrades. We discuss |
| File Format | |
| Language | English |
| Publisher Date | 2007-01-01 |
| Access Restriction | Open |
| Subject Keyword | Traust Authorization Service Trust Negotiation Technology Third-party Authorization Service Policy Language Traust Act Issue Access Token Prototype Trust Negotiation System Protocol Upgrade Widespread Software Organizational Boundary Trust Negotiation Trust-aware Application Incremental Adoption Appropriate Resource Access Policy Desirable Theoretical Property Legacy Application Promising Technology Present Traust Traust Architecture Authorization Broker Open-system Environment Viable Solution Bureaucratic Process Novel Authorization Solution Recent Year Open System |
| Content Type | Text |
| Resource Type | Article |