Loading...
Please wait, while we are loading the content...
Responding to Policies at Runtime in Trustbuilder (2004)
| Content Provider | CiteSeerX |
|---|---|
| Author | Dr, Date Ng, Dennis Bryce, G. Rex Smith, Bryan |
| Description | RESPONDING TO POLICIES AT RUNTIME IN TRUSTBUILDER Bryan Smith Department of Computer Science Master of Science Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach to negotiating trust is for the participants to exchange access control policies to inform each other of the requirements for establishing trust. When a policy is received at runtime, a compliance checker determines which credentials satisfy the policy so they can be disclosed. In situations where several sets of credentials satisfy a policy and some of the credentials are sensitive, a compliance checker that generates all the sets is necessary to insure that the negotiation succeeds whenever possible. Compliance checkers designed for trust management do not usually generate all the satisfying sets. In this thesis, we present two practical algorithms for generating all satisfying sets given a compliance checker that generates only one set. The ability to generate all of the combinations provides greater flexibility in how the system or user establishes trust. For example, the least sensitive credential combination could be disclosed first. These ideas have been implemented in TrustBuilder, our prototype system for trust negotiation. |
| File Format | |
| Language | English |
| Publisher | IEEE Computer Society Press |
| Publisher Date | 2004-01-01 |
| Publisher Institution | In Proceedings of the Fifth IEEE Workshop on Policies for Distributed Systems and Networks (POLICY |
| Access Restriction | Open |
| Subject Keyword | Practical Algorithm Digital Credential Trust Management Computer Science Master Compliance Checker Science Automated Trust Negotiation Prior Relationship Iterative Disclosure Compliance Checker Determines Prototype System Several Set Sensitive Credential Combination User Establishes Trust Trust Negotiation Access Control Policy |
| Content Type | Text |
| Resource Type | Article |