|Table of Contents|

[1] Li Kai, Lu Zhengding, Li Ruixuan, Tang Zhuo, et al. Agent based automated trust negotiation model [J]. Journal of Southeast University (English Edition), 2007, 23 (3): 469-473. [doi:10.3969/j.issn.1003-7985.2007.03.035]
Copy

Agent based automated trust negotiation model()
一种基于代理的自动信任协商模型
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
23
Issue:
2007 3
Page:
469-473
Research Field:
Computer Science and Engineering
Publishing date:
2007-09-30

Info

Title:
Agent based automated trust negotiation model
一种基于代理的自动信任协商模型
Author(s):
Li Kai Lu Zhengding Li Ruixuan Tang Zhuo
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
李开 卢正鼎 李瑞轩 唐卓
华中科技大学计算机科学与技术学院, 武汉 430074
Keywords:
automated trust negotiation agent credential access control policy negotiation protocol
自动信任协商 代理 信任凭证 访问控制策略 协商协议
PACS:
TP311
DOI:
10.3969/j.issn.1003-7985.2007.03.035
Abstract:
To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model(ABAM)is proposed.The ABAM introduces an agent to keep the negotiation process with no human intervention.Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate.Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked.Finally, the ABAM presents a new negotiation protocol to guide the negotiation process.A use case is studied to illuminate that the ABAM is sound and reasonable.Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.
为增强信任协商系统的实用性, 提出一种基于代理的自动信任协商模型(ABAM).ABAM引进代理使协商过程免于人工干涉.同时, ABAM指定了元策略格式, 使用这种格式灵活的信任凭证来满足访问控制策略要求, 而不需披露数字证书的全部内容.此外, ABAM使用高强度的非对称函数加密传输消息, 能防止消息遭受攻击.最后, 模型中提出一种新的协商协议来指导协商进行.事例分析表明, ABAM是健全和合理的.与现有工作相比, ABAM在智能性、保密性和协商效率方面得到了改进.

References:

[1] Liao Zhensong, Jin Hai, Li Chisong, et al.Automated trust negotiation and its development trend[J].Journal of Software, 2006, 17(9):1933-1948.(in Chinese)
[2] Winsborough W H, Li N.Towards practical automated trust negotiation[C]//Proc of the 3rd International Workshop on Policies for Distributed Systems and Networks.Los Alamitos:IEEE Computer Society, 2002:92-103.
[3] Winsborough W H, Seamons K E, Jones V E.Automated trust negotiation[C]//DARPA Information Survivability Conference and Exposition.Piscataway:IEEE Press, 2000:88-102.
[4] Jin H, Liao Z S, Zou D Q, et al.A new approach to hide policy for automated trust negotiation[C]//Proc of the 1st International Workshop on Security.Berlin:Springer-Verlag, 2006:168-178.
[5] Winsborough W H, Li N.Protecting sensitive attributes in automated trust negotiation[C]//Proc of ACM Workshop on Privacy in the Electronic Society.New York:ACM Press, 2002:102-113.
[6] Yu T, Winslett M.A unified scheme for resource protection in automated trust negotiation[C]//IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2003:245-257.
[7] Winsborough W H, Li N.Safety in automated trust negotiation[C]//Proc of the IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2004:147-160.
[8] Yu T.Dynamic trust establishment in open systems[D].Urbana-Champaign:Department of Computer Science of University of Illinois, 2003.
[9] Seamons K, Winslett M, Yu T.Limiting the disclosure of access control policies during automated trust negotiation[C]//Proceedings of the Network and Distributed System Security Symposium.San Diego, CA, 2001:45-56.

Memo

Memo:
Biographies: Li Kai(1968—), male, graduate;Lu Zhengding(corresponding author), male, professor, zdlu@hust.edu.cn.
Last Update: 2007-09-20