Abstract
Trust negotiation is a promising approach for establishing trust in open systems like the Internet, where sensitive interactions may often occur between entities with no prior knowledge of each other. In this paper we present the work carried on so far in the area of trust negotiation as part of the Ph.D. activity. More precisely, we describe Trust-χ, the XML based framework for trust negotiations we have developed, and emphasize the open issues to be covered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
World Wide Web Consortium, http://www.w3.org/
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-χ – A Peer to Peer Framework for Trust Establishment. TKDE, Transactions on Knowledge and Data Engineering (July 2004) (to appear)
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust negotiations: Concepts, systems and languages. IEEE CISE (July 2004) (to appear)
Bertino, E., Ferrari, E., Squicciarini, A.C.: χ-TNL – An XML based language for trust negotiations. In: Proc. 4th IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 81–84 (2003)
Bertino, E., Ferrari, E., Squicciarini, A.C.: Privacy preserving trust negotiation. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 283–301. Springer, Heidelberg (2005)
Bonatti, P.A., Samarati, P.: Regulating access services and information release on the Web. In: CCS 2000 Proc., pp. 134–143 (2000)
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, World Wide Web Consortium (April 2002), http://www.w3.org/TR/P3P
Herzberg, A., Mass, Y., Michaeli, J., Naor, D., Ravid, Y.: Access control meets public infrastructure, or: Assigning roles to strangers. In: S&P 2000 Proc. (2000)
Housley, R., Polk, T., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and certificate revocation list (CRL) profile. RFC 3280, Network Working Group (April 2002)
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: POLICY 2002 Proc., pp. 68–79 (2002)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, Englewood Cliffs (1999)
Winsborough, W.H., Li, N.: Protecting sensitive attributes in automated trust negotiation. In: WPES 2002 Proc., pp. 41–51 (2002)
Yu, T., Winslett, M.: A unified Scheme for Resource protection in Automated Trust Negotiation. In: S&P 2003 Proc., pp. 110–122 (2003)
Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6(1), 1–42 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Squicciarini, A.C. (2004). Trust Negotiation Systems. In: Lindner, W., Mesiti, M., Türker, C., Tzitzikas, Y., Vakali, A.I. (eds) Current Trends in Database Technology - EDBT 2004 Workshops. EDBT 2004. Lecture Notes in Computer Science, vol 3268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30192-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-30192-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23305-3
Online ISBN: 978-3-540-30192-9
eBook Packages: Computer ScienceComputer Science (R0)