Proceedings Third International Workshop on Policies for Distributed Systems and Networks
DOI: 10.1109/policy.2002.1011297
|View full text |Cite
|
Sign up to set email alerts
|

Towards practical automated trust negotiation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
128
0

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 156 publications
(128 citation statements)
references
References 5 publications
0
128
0
Order By: Relevance
“…Current trust negotiation prototypes (e.g., [4,5,12,23]) implement incremental consistency by validating credentials as they are received. This approach to credential validation is also discussed in many papers that present protocols and strategies for trust negotiations and distributed proving that, to the best of our knowledge, have not yet been implemented (e.g., [6,14,21,24], to name a few).…”
Section: Definition 8 (Incremental Consistency) a View V Pt E Is Inmentioning
confidence: 99%
See 1 more Smart Citation
“…Current trust negotiation prototypes (e.g., [4,5,12,23]) implement incremental consistency by validating credentials as they are received. This approach to credential validation is also discussed in many papers that present protocols and strategies for trust negotiations and distributed proving that, to the best of our knowledge, have not yet been implemented (e.g., [6,14,21,24], to name a few).…”
Section: Definition 8 (Incremental Consistency) a View V Pt E Is Inmentioning
confidence: 99%
“…Two proposed authorization techniques for these types of environments are trust negotiation [4,5,12,14,15,21,23,25] and distributed proving [3,18,24]. In these types of systems, participants collect certified credentials that describe their attributes, environmental conditions, and other state information from any number of external entities.…”
Section: Introductionmentioning
confidence: 99%
“…Their trust establishment framework uses logical rules for accessing services and avoiding the unnecessary disclosure of sensitive information. Winsborough and Li [23] introduced the Trust Target Graph (TTG) protocol for conducting trust negotiation. A particular emphasis of their work was protection against leaking sensitive information during a trust negotiation.…”
Section: Related Workmentioning
confidence: 99%
“…7(b)). In a typical ATN session, the client and server engage in a protocol that results in the collaborative and incremental construction of a directed acyclic graph, called trust-target graph, that represents credentials (e.g., a proof that a party has a certain role in an organization) and policies indicating that the disclosure of a credential by one party is subject to the prior disclosure of a set of credentials by the other party [22]. A tool based on the Grappa system [2], a Java port of Graphviz [7], is used to generate successive drawings of the trust-target graph being constructed in an ATN session.…”
Section: Trust Negotiationmentioning
confidence: 99%