[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/501983.502004acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Interoperable strategies in automated trust negotiation

Published: 05 November 2001 Publication History

Abstract

Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify what combinations of credentials a stranger must disclose in order to gain access to each local service or credential. We introduce the concept of a trust negotiation protocol, which defines the ordering of messages and the type of information messages will contain. To carry out trust negotiation, a party pairs its negotiation protocol with a trust negotiation strategy that controls the exact content of the messages, i.e., which credentials to disclose, when to disclose them, and when to terminate a negotiation. There are a huge number of possible strategies for negotiating trust, each with different properties with respect to speed of negotiations and caution in giving out credentials and policies. In the autonomous world of the Internet, entities will want the freedom to choose negotiation strategies that meet their own goals, which means that two strangers who negotiate trust will often not use the same strategy. To date, only a tiny fraction of the space of possible negotiation strategies has been explored, and no two of the strategies proposed so far will interoperate. In this paper, we define a large set of strategies called the disclosure tree strategy (DTS) family. Then we prove that if two parties each choose strategies from the DTS family, then they will be able to negotiate trust as well as if they were both using the same strategy. Further, they can change strategies at any point during negotiation. We also show that the DTS family is closed, i.e., any strategy that can interoperate with every strategy in the DTS family must also be a member of the DTS family. We also give examples of practical strategies that belong to the DTS family and fit within the TrustBuilder architecture and protocol for trust negotiation.

References

[1]
K.R.Apt,D.S.Warren,and M.Truszczynski (editor).The Logic Programming Paradigm:A 25-Year Perspective .Springer-Verlag,1999.]]
[2]
M.Blaze,J.Feigenbaum,J.Ioannidis,and A.Keromytis.The KeyNote Trust Management System Version 2.In Internet Draft RFC 2704, September 1999.]]
[3]
M.Blaze,J.Feigenbaum,and A.D.Keromytis. KeyNote:Trust Management for Public-Key Infrastructures.In Security Protocols Workshop, Cambridge,UK,1998.]]
[4]
P.Bonatti and P.Samarati.Regulating Service Access and Information Release on the Web.In Conference on Computer and Communications Security,Athens, November 2000.]]
[5]
T.Dierks and C.Allen.The TLS Protocol Version 1.0. In http://www.ietf.org/rfc/rfc2246.txt,January 1999.]]
[6]
S.Farrell.TLS Extension for Attribute Certi .cate Based Authorization.In http://www.ietf.org/internetdrafts/draft-ietf-tls-attr-cert-01.txt,August 1998.]]
[7]
A.Frier,P.Karlton,and P.Kocher.The SSL 3.0 Protocol .Netscape Communications Corp.,November 1996.]]
[8]
A.Herzberg,J.Mihaeli,Y.Mass,D.Naor,and Y.Ravid.Access Control Meets Public Key Infrastructure,Or:Assigning Roles to Strangers.In IEEE Symposium on Security and Privacy,Oakland, CA,May 2000.]]
[9]
http://www.ietf.org/html.charters/spki-charter.html. Simple Public Key Infrastructure (SPKI).]]
[10]
International Telecommunication Union.Rec.X.509 - Information Technology -Open Systems Interconnection -The Directory:Authentication Framework,August 1997.]]
[11]
W.Johnson,S.Mudumbai,and M.Thompson. Authorization and Attribute Certi .cates for Widely Distributed Access Control.In IEEE International Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises,1998.]]
[12]
K.Seamons,M.Winslett,and T.Yu.Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.In Network and Distributed System Security Symposium,San Diego, CA,April 2001.]]
[13]
W3C, http://www.w3.org/TR/WD-P3P/Overview.html. Platform for Privacy Preferences (P3P)Speci .cation .]]
[14]
W.Winsborough,K.Seamons,and V.Jones. Automated Trust Negotiation.In DARPA Information Survivability Conference and Exposition, Hilton Head,SC,January 2000.]]
[15]
T.Yu,X.Ma,and M.Winslett.PRUNES:An E .cient and Complete Strategy for Automated Trust Negotiation over the Internet.In Conference on Computer and Communication Security,Athens, Greece,November 2000.]]
[16]
T.Yu,M.Winslett,and K.Seamons.Interoperable Strategies in Automated Trust Negotiation.In http://drl.cs.uiuc.edu/pubs/ccs2001-long.ps .]]
[17]
P.Zimmerman.PGP User 's Guide MIT Press,1994.]]

Cited By

View all
  • (2022)Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog ComputingIEEE Transactions on Big Data10.1109/TBDATA.2017.27054188:1(35-47)Online publication date: 1-Feb-2022
  • (2022)Point-Based Trust: Define How Much Privacy Is WorthInformation and Communications Security10.1007/11935308_14(190-209)Online publication date: 10-Mar-2022
  • (2020)A Model Specification Implementation for Trust NegotiationNetwork and System Security10.1007/978-3-030-65745-1_19(327-341)Online publication date: 19-Dec-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security
November 2001
274 pages
ISBN:1581133855
DOI:10.1145/501983
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 November 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

CCS01
Sponsor:

Acceptance Rates

CCS '01 Paper Acceptance Rate 27 of 153 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog ComputingIEEE Transactions on Big Data10.1109/TBDATA.2017.27054188:1(35-47)Online publication date: 1-Feb-2022
  • (2022)Point-Based Trust: Define How Much Privacy Is WorthInformation and Communications Security10.1007/11935308_14(190-209)Online publication date: 10-Mar-2022
  • (2020)A Model Specification Implementation for Trust NegotiationNetwork and System Security10.1007/978-3-030-65745-1_19(327-341)Online publication date: 19-Dec-2020
  • (2019)A model specification for the design of trust negotiationsComputers and Security10.1016/j.cose.2019.03.02484:C(288-300)Online publication date: 1-Jul-2019
  • (2016)An efficient trust negotiation strategy towards the resource-limited mobile commerce environmentFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-015-4559-210:3(543-558)Online publication date: 1-Jun-2016
  • (2015)A description logic-based policy compliance checker for trust negotiationPeer-to-Peer Networking and Applications10.1007/s12083-015-0343-19:2(372-383)Online publication date: 1-Apr-2015
  • (2014)On access control policy assignments and negotiation strategies in automated trust negotiationInternational Journal of Security and Networks10.1504/IJSN.2014.0607449:2(104-113)Online publication date: 1-Apr-2014
  • (2014)Access ControlComputing Handbook, Third Edition10.1201/b16812-54(1-26)Online publication date: 8-May-2014
  • (2013)On the integration of trust with negotiation, argumentation and semanticsThe Knowledge Engineering Review10.1017/S026988891300006429:01(31-50)Online publication date: 21-Mar-2013
  • (2013)An ontology-based approach to automated trust negotiationComputer Standards & Interfaces10.1016/j.csi.2013.03.00336:1(219-230)Online publication date: 1-Nov-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media