Abstract
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive interactions may often occur between entities with no prior knowledge of each other. Although several proposals today exist of systems for the management of trust negotiations none of them addresses in a comprehensive way the problem of privacy preservation. Privacy is today one of the major concerns of users exchanging information through the Web and thus we believe that trust negotiation systems must effectively address privacy issues to be widely acceptable. For these reasons, in this paper we investigate privacy in the context of trust negotiations. More precisely, we propose a set of privacy preserving features to be included in any trust negotiation system, such as the support for the P3P standard, as well as different formats to encode credentials.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Westin, A.F.: Privacy and Freedom, Atheneum, New York (1967)
Winsborough, W.H., Li, N.: Protecting sensitive attributes in automated trust negotiation. In: ACM Workshop on Privacy in the Electronic Society (2002)
Winslett, M., et al.: Negotiating Trust on The Web. IEEE Internet Computing 6(6), 30–37 (2002)
Agraval, R., Kiernan, J., Srikant, R., Yu, X.: Implementing P3P using database technology. In: 19th International Conference on Data Engineering, Bangalore, India (2003)
Cranor, L., Langheirich, M., Marchiori, M.: The Platform for Privacy Preferences 1.0 (p3p1.0) specification, W3C Reccomandation (2002), http://www.w3.org/P3P/brochure.html
Cranor, L., Langheirich, M., Marchiori, M.: A P3P Preference Exchange Language 1.0 (appel1.0) W3C Working Draft (2002)
Bonatti, P., Samarati, P.: Regulating Access Services and Information Release on the Web. In: 7th ACM Conference on Computer and Communications Security, Athens, Greece (2000)
Herzberg, A., Mihaeli, et al.: Access Control meets Public Key Infrastructure, or: Assigning Roles to Strangers. In: IEEE Symposium on Security and Privacy, Oakland, CA (2000)
Seamons, K.E., Winslett, M., Yu, T.: Limiting the disclosure of Access Control Policies during Automated Trust Negotiation. Network and Distributed System Security Simposium, San Diego, CA (2001)
Yu, T., Winslett, M.: A Unified Scheme for Resource protection in Automated Trust Negotiation. In: IEEE Symposium on Security and Privacy, Oakland, CA (2003)
Winsborough, W., Li, N.: Towards Practical Automated Trust Negotiation (2002)
Bertino, E., Ferrari, E., Squicciarini, A.: Trust-X - a Peer to Peer Framework for Trust Establishment. In: IEEE TKDE, Transactions on Knowledge and Data Engineering (2004) (to appear)
Seamons, K.E., Winslett, M., Yu, T.: Protecting privacy during on line trust negotiation. In: 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA (2002)
Brands, S.: Rethinking Public Key Infrastructure and Digital Credentials. MIT Press, Cambridge (2000)
Herzberg, A., Mass, Y.: Relying Party Credentials Framework. In: RSA Conference, San Francisco, CA (2001)
Bertino, E., Ferrari, E., Squicciarini, A.: X-TNL - an XML based language for trust negotiations. In: Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, Como, Italy (2003)
Naor, M.: Bit commitment using pseudorandomness. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 128–136. Springer, Heidelberg (1990)
Persiano, P., Visconti, I.: User Privacy Issues Regarding Certificates and the TLS Protocol. In: Proceedings of the ACM Conference on Computer and Communication Security, Athens, Greece (2000)
Jarvis, R.: Selective disclosure of credential content during trust negotiation, Master of Science Thesis, Brigham Young University, Provo, Utah (2003)
World Wide Web Consortium: Extensible markup language (xml) 1.0 (1998), Available at, http://www.w3.org/TR/REC-xml
World Wide Web Consortium (Uniform resource identifiers, naming and addressing: Uris, urls, ...) Available at, http://www.w3.org/addressing
Agraval, R., Kiernan, J., Srikant, R., Xu, Y.: An X-Path based preference language for P3P. In: Twelfth International World Wide Web Conference, Budapest, Hungary (2003)
World Wide Web Consortium (References for p3p implementation) Available at, http://www.w3.org/P3P/implementations
IBM: (Ibm tivoli privacy wizard) Available at, http://www.tivoli.resource_center/maximize/privacy/wizard_code.html
Center, J.J.R.: Jrc p3p resource centre (2002), Available at, http://p3p.jrc.it
World Wide Web Consortium: P3p- the Platform for Privacy Preferences, version 1.1 (2003), Available at, http://www.w3.org/P3P/1.1/
World Wide Web Consortium: Xsl transformations (xslt). version 1.0 w3c recommendation (1999), Available at, http://www.w3.org/TR/xslt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bertino, E., Ferrari, E., Squicciarini, A.C. (2005). Privacy-Preserving Trust Negotiations. In: Martin, D., Serjantov, A. (eds) Privacy Enhancing Technologies. PET 2004. Lecture Notes in Computer Science, vol 3424. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423409_18
Download citation
DOI: https://doi.org/10.1007/11423409_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26203-9
Online ISBN: 978-3-540-31960-3
eBook Packages: Computer ScienceComputer Science (R0)