REFEREE: trust management for Web applications
Selected papers from the sixth international conference on World Wide Web
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Securing XML documents: the author-X project demonstration
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
IEEE Internet Computing
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Integrating presence inference into trust management for ubiquitous systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Privacy Preserving Trust Authorization Framework Using XACML
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Policies and conflicts in call control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 1st international conference on Autonomic computing and communication systems
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
ICLP '08 Proceedings of the 24th International Conference on Logic Programming
Qualitative trust modeling in SOA
Journal of Systems Architecture: the EUROMICRO Journal
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Nonmonotonic Trust Management for P2P Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
An introduction to trust negotiation
iTrust'03 Proceedings of the 1st international conference on Trust management
A RT0-based compliance checker model for automated trust negotiation
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Rule-based policy representations and reasoning
Semantic techniques for the web
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Social-Compliance in Trust Management within Virtual Communities
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
Synergy: a policy-driven, trust-aware information dissemination framework
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Trust lifecycle management in a global computing environment
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
A unifying framework for behavior-based trust models
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
An adaptive and Socially-Compliant Trust Management System for virtual communities
Proceedings of the 27th Annual ACM Symposium on Applied Computing
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Compliance checking for usage-constrained credentials in trust negotiation systems
ISC'12 Proceedings of the 15th international conference on Information Security
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
Adaptiveness and social-compliance in trust management within virtual communities
Web Intelligence and Agent Systems - Web Intelligence and Communities
Hi-index | 0.00 |
In open systems like the Internet, traditionalapproaches to security based on identity do not provide asolution to the problem of establishing trust betweenstrangers, because strangers do not share the samesecurity domain. A new approach to establishing trustbetween strangers is trust negotiation, the bilateralexchange of digital credentials describing attributes of thenegotiation participants. This approach relies on accesscontrol policies that govern access to protected resourcesby specifying credential combinations that must besubmitted to obtain authorization. In this paper wedescribe a model for trust negotiation, focusing on thecentral role of policies. We delineate requirements forpolicy languages and runtime systems for trustnegotiation, and evaluate four existing policy languagesfor trust management with respect to those requirements.We conclude with recommendations for extending existingpolicy languages or developing new policy languages tomake them suitable for use in future trust negotiationsystems.