IFIP – The International Federation for Information Processing
DOI: 10.1007/978-0-387-09428-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management in P2P Systems Using Standard TuLiP

Abstract: In this paper we introduce Standard TuLiP -a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential storage by providing a sound and complete Lookup and Inference AlgoRithm (LIAR). In this paper we focus on (a) the language of Standard TuLiP and (b) on the practical considerations which arise when deploying the system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…45 Contrarily to many of the existing algorithms (e.g., see Ref. 13,29), GEM retrieves the credentials necessary to construct a chain of trust in a completely distributed way without disclosing the security policies of parties, thereby preserving their confidentiality. • Ontology-based services to enable autonomy and interoperability among the parties in an SoS.…”
Section: Overview Of the Solution And Framework's Ingredientsmentioning
confidence: 99%
See 1 more Smart Citation
“…45 Contrarily to many of the existing algorithms (e.g., see Ref. 13,29), GEM retrieves the credentials necessary to construct a chain of trust in a completely distributed way without disclosing the security policies of parties, thereby preserving their confidentiality. • Ontology-based services to enable autonomy and interoperability among the parties in an SoS.…”
Section: Overview Of the Solution And Framework's Ingredientsmentioning
confidence: 99%
“…Contrarily to other algorithms (e.g., see Ref. 13,29), GEM, the policy evaluation algorithm used within our framework, derives the credentials required by the operators of IT-1 and CG-1 to access the requested information without disclosing the security policies of the parties in the SoS. Finally, the alignment of the vocabularies of the Dutch navy and the Dutch coastguard is performed in a completely automated way, allowing the Dutch navy to compute the similarity between concepts "SAR vessel" and "SAR lifeboat" on the fly, without requiring knowledge of the ontologies where the two concepts are defined.…”
Section: Eu Navformentioning
confidence: 99%
“…Because we want to use grouping in our trust management system TuLiP [10,9], we want to be able to use grouping not only in queries but also as subgoals in programs. In this section we discuss the use of moded_bagof in programs.…”
Section: Using Moded_bagof In Queries and Programsmentioning
confidence: 99%
“…Grouping and aggregation are useful in practice, and paramount in database systems. In fact, the reason why we address the problem here is of a practical nature: we are developing a language for trust management [5,7,18] called TuLiP [8,9,10]. TuLiP is based on (partially function-free) moded logic programming, in which a logic program is augmented with an indication of which are the input and the output positions of each predicate.…”
Section: Introductionmentioning
confidence: 99%
“…A parallel evaluation between the identified functional policy requirements and the constraints imposed by the nature of tactical SOA, was undertaken for the examination of suitable security policy frameworks. This examination included commonly used mechanisms, such as WS -Security, SAML [5], XACML [6] and Ponder [7], as well as recent semantic (REI [8], KAOS [9], ROWLBAC [10], Kolter et al [11], Trivellato et al [12]) and trust management frameworks (cassandra [13], Tulip [14], RT [15], Peer-Trust [16]). This analysis promoted the use of web ontology language (OWL) as the most suitable solution in respect to the requirements of tactical SOA.…”
Section: Introductionmentioning
confidence: 99%