A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
ACM Transactions on Information and System Security (TISSEC)
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
Towards Automated Negotiation of Access Control Policies
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Collaborative Automated Trust Negotiation in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Traust: a trust negotiation-based authorization service for open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
E-SCIENCE '06 Proceedings of the Second IEEE International Conference on e-Science and Grid Computing
TOWER: Practical Trust Negotiation Framework for Grids
E-SCIENCE '06 Proceedings of the Second IEEE International Conference on e-Science and Grid Computing
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A dynamic privacy model for web services
Computer Standards & Interfaces
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Policy-Based vulnerability assessment for virtual organisations
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
Security issues have always limited the way we do things. In an organisation we provide security by granting privileges to either identities or roles. However this becomes more challenging when the objective is collaboration across organisational boundaries. Numerous access control approaches exist today to address the cross-boundary control issues. However an optimal approach would be to fold remote security credentials into local security credentials, thereby bridging the gap that makes decentralised security policies for multi-domain collaboration difficult. In this paper, dynamic trust negotiation is presented as a possible optimal approach that provides support for decentralised access control. We show how trust pathways can be established and how remote security credentials could be folded to local security credentials through trust contracts.