Distributed snapshots: determining global states of distributed systems
ACM Transactions on Computer Systems (TOCS)
Consistent Global Checkpoints that Contain a Given Set of Local Checkpoints
IEEE Transactions on Computers
KQML as an agent communication language
Software agents
ACM SIGAda Ada Letters
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
Autonomous Agents and Multi-Agent Systems
RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols
FTCS '98 Proceedings of the The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing
Secure mediation: requirements, design, and architecture
Journal of Computer Security - IFIP 2000
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Automated Trust Negotiation
WS-Negotiation: An Overview of Research Issues
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 1 - Volume 1
WS-Negotiation: An Overview of Research Issues
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 1 - Volume 1
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
Ws-AC: A Fine Grained Access Control System for Web Services
World Wide Web
Access control enforcement for conversation-based web services
Proceedings of the 15th international conference on World Wide Web
Crash failure detection in asynchronous agent communication languages
Autonomous Agents and Multi-Agent Systems
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication
Journal of Network and Systems Management
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
Matching Policies with Security Claims of Mobile Applications
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
AN ACL FOR SPECIFYING FAULT-TOLERANT PROTOCOLS
Applied Artificial Intelligence
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
IEEE Transactions on Dependable and Secure Computing
Protocol engineering for web services conversations
Engineering Applications of Artificial Intelligence
A sentinel based exception diagnosis in market based multi-agent systems
DEECS'06 Proceedings of the Second international conference on Data Engineering Issues in E-Commerce and Services
Security-by-contract: toward a semantics for digital signatures on mobile code
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
In a federation of heterogeneous nodes that organize themselves, the lack of a trusted third party does not allow establishing a priori trust relationships among strangers. Automated trust negotiation (TN) is a promising approach to establish sufficient trust among parties, allowing them to access sensitive data and services in open environments. Although the literature on TN is growing, two key issues have still to be addressed. The first one concerns a typical feature of real-life negotiations: we are usually willing to trade the disclosure of personal attributes in exchange for additional services and only in a particular order (according to our preferences). The second one concerns dependability. By their nature TN systems are used in unreliable contexts where it is important not only to protect negotiations against malicious attack (self-protection), but also against accidental failures (self-healing). In this paper we address these issues proposing a novel dependable negotiation framework where services, needed credentials, and behavioral constraints on the disclosure of privileges are bundled together.