Handbook of theoretical computer science (vol. B)
Role-Based Access Control Models
Computer
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
Policy Specification for Programmable Networks
IWAN '99 Proceedings of the First International Working Conference on Active Networks
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An Adaptive Policy-Based Framework for Network Services Management
Journal of Network and Systems Management
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Computer Networks: The International Journal of Computer and Telecommunications Networking
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
From web data to entities and back
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
ACConv -- An Access Control Model for Conversational Web Services
ACM Transactions on the Web (TWEB)
Computers & Mathematics with Applications
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Autonomic computing and communication has become a new paradigm for dynamic service integration and resource sharing in today's ambient networks. Devices and systems need to dynamically collaborate and federate with little known or even unknown parties in order to perform everyday tasks. Those devices and systems act as independent nodes that autonomously manage and enforce their own security policies.Thus in autonomic pervasive communications clients may not know a priori what access rights they need in order to execute a service nor service providers know a priori what credentials and privacy requirements clients have so that they can take appropriate access decisions.To solve this problem we propose a negotiation scheme that protects security and privacy interests with respect to information disclosure while still providing effective access control to services. The scheme proposes a negotiation protocol that allows entities in a network to mutually establish sufficient access rights needed to grant a service.