Trust negotiation: authorization for virtual organizations

  • Authors:
  • M. Winslett;Adam J. Lee;Kenneth J. Perano

  • Affiliations:
  • University of Illinois, Urbana, IL;University of Pittsburgh, Pittsburgh, PA;Sandia National Laboratories, Livermore, CA

  • Venue:
  • Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trust negotiation is an authorization approach for open distributed systems, such as dynamic coalitions and other types of virtual organizations. Under the trust negotiation approach to authorization, every resource that might be shared within the coalition is protected by an access policy that describes the attributes of those qualified to access it (e.g., employer, job title, role, age). Each party collects digital credentials, such as X.509 attribute certificates or SAML assertions, from credential issuers who can attest to that party's attributes. At run time, a resource owner and potential client exchange information on their access policies and attributes, to determine whether the client possesses the attributes necessary to gain access, and vice versa. Trust negotiation has a firm theoretical foundation and a number of freely available implementations. In this paper, we argue that trust negotiation is ready for a trial deployment in a real-world application. We describe the software available for a deployment, including the flexible TrustBuilder2 framework for experimenting with trust negotiation runtime systems, and the CLOUSEAU compliance checker, which can quickly determine whether a set of credentials complies with a particular policy. We also describe the Traust approach for letting legacy applications take advantage of trust negotiation.