Proceedings of the 12th ACM Conference on Computer and Communications Security 2005
DOI: 10.1145/1102120.1102128
|View full text |Cite
|
Sign up to set email alerts
|

Preventing attribute information leakage in automated trust negotiation

Abstract: Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other party. Ideally, sensitive information should not be known by others unless its access control policy has been satisfied. However, due to bilateral information exchange, information may flow to others in a variety of forms, many of which cannot be protecte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(31 citation statements)
references
References 28 publications
(43 reference statements)
0
31
0
Order By: Relevance
“…They propose several more refined notions of safety for trust negotiation protocols based on the concept of indistinguishability, each of which gives users stronger guarantees regarding the amount of private information leaked during the negotiation. Irwin and Yu [11] propose another definition of safety based on the idea of information gain. Our work is orthogonal to these previous works in that we are concerned with safety problems that emerge as a result of the consistency of the underlying state information used during policy evaluation rather than those that arise due to information leakage during a negotiation.…”
Section: Related Workmentioning
confidence: 99%
“…They propose several more refined notions of safety for trust negotiation protocols based on the concept of indistinguishability, each of which gives users stronger guarantees regarding the amount of private information leaked during the negotiation. Irwin and Yu [11] propose another definition of safety based on the idea of information gain. Our work is orthogonal to these previous works in that we are concerned with safety problems that emerge as a result of the consistency of the underlying state information used during policy evaluation rather than those that arise due to information leakage during a negotiation.…”
Section: Related Workmentioning
confidence: 99%
“…Research on credential-based access control (e.g., [2], [3], [9], [11], [12], [15]) primarily focused on solutions for controlling access to resources, for specifying and enforcing policies, and for enabling negotiation strategies, which may be indifferently adopted by the client and the server. Such solutions however do not allow the client to exploit the emerging technology (e.g., SAML [1], OpenID [8], and anonymous credentials [4], [5]) for determining which credentials and/or properties release to minimize the sensitive information communicated to the server.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the contexts in which information leakage is currently being addressed are privacypreserving databases [6,24,27,29], automated trust negotiation [15], and error correction [9]. However, there is little work on information leakage through integrity verification and signature of data, especially trees.…”
Section: Related Workmentioning
confidence: 99%