Simple fast algorithms for the editing distance between trees and related problems
SIAM Journal on Computing
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
OpenID 2.0: a platform for user-centric identity management
Proceedings of the second ACM workshop on Digital identity management
Safety and consistency in policy-based authorization systems
Proceedings of the 13th ACM conference on Computer and communications security
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
The Traust Authorization Service
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Identity based negotiations are convenient protocols to closely control users' personal data, that empower users to negotiate the trust of unknown counterparts by carefully governing the disclosure of their identities. Such type of negotiations presents, however, unique challenges, mainly caused by the way identity attributes are distributed and managed. In this paper we present novel approach for conducting long running negotiations in the context of digital identity management systems. We propose some major extensions to an existing trust negotiation protocol to support negotiations that are conducted during multiple sessions. To the best of our knowledge, this is the first time a protocol for conducting trust negotiations over multiple sessions is presented.