DOI: 10.1007/978-3-540-74917-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Automated Trust Negotiation in Autonomic Environments

Abstract: Abstract. Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devices with no prior trust relationship. They can reach an agreement by iteratively exchanging credentials during a negotiation process. These credentials can serve as authorization tokens or may carry information that becomes a parameter of the further service usage. A careful negotiation strategy helps in protecting sensitiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…If the credentials include the attributes, then we trust the entity, or do not trust. Automated trust negotiation [5] is a special case of credential-based trust management. Experience-based trust management [6] is similar to the trust relationship between human society, and it mainly used to solve the access control and service selection, but often focus on service selection.…”
Section: Trust and Securitymentioning
confidence: 99%
“…If the credentials include the attributes, then we trust the entity, or do not trust. Automated trust negotiation [5] is a special case of credential-based trust management. Experience-based trust management [6] is similar to the trust relationship between human society, and it mainly used to solve the access control and service selection, but often focus on service selection.…”
Section: Trust and Securitymentioning
confidence: 99%
“…In this paper self-* denotes self-configuring, self-organizing, self-managing and self-repairing. We will concentrate on an overall picture containing the required core concepts, and for a more detailed discussion of technical aspects we refer to [13] [14]. As one result, the aspired approach would change the way how subscriber, network operator and service provider interact in a beneficial way for all parties.…”
Section: Introductionmentioning
confidence: 99%