|Table of Contents|

[1] Li Kai, Lu Zhengding, Li Ruixuan, Tang Zhuo, et al. Agent based automated trust negotiation model [J]. Journal of Southeast University (English Edition), 2007, 23 (3): 469-473. [doi:10.3969/j.issn.1003-7985.2007.03.035]
Copy

Agent based automated trust negotiation model()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
23
Issue:
2007 3
Page:
469-473
Research Field:
Computer Science and Engineering
Publishing date:
2007-09-30

Info

Title:
Agent based automated trust negotiation model
Author(s):
Li Kai Lu Zhengding Li Ruixuan Tang Zhuo
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Keywords:
automated trust negotiation agent credential access control policy negotiation protocol
PACS:
TP311
DOI:
10.3969/j.issn.1003-7985.2007.03.035
Abstract:
To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model(ABAM)is proposed.The ABAM introduces an agent to keep the negotiation process with no human intervention.Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate.Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked.Finally, the ABAM presents a new negotiation protocol to guide the negotiation process.A use case is studied to illuminate that the ABAM is sound and reasonable.Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.

References:

[1] Liao Zhensong, Jin Hai, Li Chisong, et al.Automated trust negotiation and its development trend[J].Journal of Software, 2006, 17(9):1933-1948.(in Chinese)
[2] Winsborough W H, Li N.Towards practical automated trust negotiation[C]//Proc of the 3rd International Workshop on Policies for Distributed Systems and Networks.Los Alamitos:IEEE Computer Society, 2002:92-103.
[3] Winsborough W H, Seamons K E, Jones V E.Automated trust negotiation[C]//DARPA Information Survivability Conference and Exposition.Piscataway:IEEE Press, 2000:88-102.
[4] Jin H, Liao Z S, Zou D Q, et al.A new approach to hide policy for automated trust negotiation[C]//Proc of the 1st International Workshop on Security.Berlin:Springer-Verlag, 2006:168-178.
[5] Winsborough W H, Li N.Protecting sensitive attributes in automated trust negotiation[C]//Proc of ACM Workshop on Privacy in the Electronic Society.New York:ACM Press, 2002:102-113.
[6] Yu T, Winslett M.A unified scheme for resource protection in automated trust negotiation[C]//IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2003:245-257.
[7] Winsborough W H, Li N.Safety in automated trust negotiation[C]//Proc of the IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2004:147-160.
[8] Yu T.Dynamic trust establishment in open systems[D].Urbana-Champaign:Department of Computer Science of University of Illinois, 2003.
[9] Seamons K, Winslett M, Yu T.Limiting the disclosure of access control policies during automated trust negotiation[C]//Proceedings of the Network and Distributed System Security Symposium.San Diego, CA, 2001:45-56.

Memo

Memo:
Biographies: Li Kai(1968—), male, graduate;Lu Zhengding(corresponding author), male, professor, zdlu@hust.edu.cn.
Last Update: 2007-09-20