skip to main content
10.1145/1341811.1341821acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesmardi-grasConference Proceedingsconference-collections
research-article

Dynamic trust negotiation for flexible e-health collaborations

Published: 29 January 2008 Publication History

Abstract

Security issues have always limited the way we do things. In an organisation we provide security by granting privileges to either identities or roles. However this becomes more challenging when the objective is collaboration across organisational boundaries. Numerous access control approaches exist today to address the cross-boundary control issues. However an optimal approach would be to fold remote security credentials into local security credentials, thereby bridging the gap that makes decentralised security policies for multi-domain collaboration difficult. In this paper, dynamic trust negotiation is presented as a possible optimal approach that provides support for decentralised access control. We show how trust pathways can be established and how remote security credentials could be folded to local security credentials through trust contracts.

References

[1]
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://ec.europa.eu/justice_home/fsj/privacy/law/index_en.htm.
[2]
Organization for the Advancement of Structured Information Standards (OASIS). Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15 March 2005.
[3]
Shibboleth Architecture Protocols and Profiles. http://shibboleth.internet2.edu/docs/draft-mace-shibboleth-arch-protocols-latest.pdf.
[4]
ITU-T Recommendation X.509 | ISO/IEC 9594-8: Information Technology Open Systems Interconnection the Directory: Public-key and Attribute Certificate Frameworks, 3, May 2001.
[5]
RFC 4271, A Border Gateway Protocol 4 (BGP-4). http://tools.ietf.org/html/rfc4271, Jan. 2006.
[6]
O. Ajayi, R. Sinnott, and A. Stell. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. In Proceedings of the 2nd International Conference on Availability, Reliability and Security, (ARESÕ07), Vienna, Austria. IEEE Computer Society, Apr. 2007.
[7]
O. Ajayi, R. Sinnott, and A. Stell. Trust Realisation in Collaborative Clinical Trials Systems. In HealthCare Computing Conference HC2007, Harrogate, England, Mar. 2007.
[8]
O. Ajayi, R. Sinnott, and A. Stell. Trust Realisation in Multi-domain Collaborative Environments. To Appear in Proceedings of 6th IEEE International Conference on Computer and Information Science, ICIS'07, July 2007.
[9]
M. Benantar. Access Control Systems: Security, Identity Management and Trust Models. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2005.
[10]
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827--842, 2004.
[11]
V. Bharadwaj and J. Baras. Towards Automated Negotiation of Access Control Policies. In Proceedings of the Fourth International Workshop on Policies for Distributed Systems and Networks (Policy 2003). IEEE Computer Society Press, 2003.
[12]
M. Boniface and P. Wilken. ARTEMIS: Towards a Secure Interoperability Infrastructure for Healthcare Information Systems, pages 181--189. From Grid to Healthgrid. IOS Press, 2005.
[13]
M. Ehrig and Y. Sure. Ontology Mapping - An Integrated Approach. In Proceedings of the First European Semantic Web Symposium, volume 3053 of Lecture Notes in Computer Science, pages 76--91. Springer Verlag, MAY 2004.
[14]
I. T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A Security Architecture for Computational Grids. In ACM Conference on Computer and Communications Security, pages 83--92, 1998.
[15]
A. J. Lee, M. Winslett, J. Basney, and V. Welch. Traust: A Trust Negotiation-based Authorization Service for Open Systems. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 39--48, New York, NY, USA, 2006. ACM.
[16]
J. Li, J. Huai, J. Xu, Y. Zhu, and W. Xue. TOWER: Practical Trust Negotiation Framework for Grids. 2nd IEEE International Conference on e-Science and Grid Computing, Dec. 2006.
[17]
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A Community Authorization Service for Group Collaboration. In POLICY '02: Proceedings of the 3rd International Workshop on Policies forDistributed Systems and Networks (POLICY'02), page 50, Washington, DC, USA, 2002. IEEE Computer Society.
[18]
R. Sinnott, J. Watt, J. Koetsier, D. Chadwick, O. Otenko, and T. Nguyen. Supporting decentralized, security focused dynamic virtual organizations across the grid. In Proceedings of 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, December 2006, 2006.
[19]
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke. Security for Grid Services. In Proceedings of 12th IEEE International Symposium on High Performance Distributed Computing, pages 48--57, June 2003.
[20]
W. Winsborough and L. Ninghui. Safety in Automated Trust Negotiation. In Proceedings of IEEE Symposium on Security and Privacy, 2004, pages 147--160, 2004.
[21]
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated Trust Negotiation. DARPA Information Survivability Conference and Exposition (DISCEX), 01:0088, 2000.
[22]
S. Ye, F. Makedon, and J. Ford. Collaborative Automated Trust Negotiation in Peer-to-Peer Systems. In P2P '04: Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P'04), pages 108--115, Washington, DC, USA, 2004. IEEE Computer Society.
[23]
T. Yu, M. Winslett, and K. E. Seamons. Interoperable Strategies in Automated Trust Negotiation. In CCS '01: Proceedings of the 8th ACM conference on Computer and Communications Security, pages 146--155, New York, NY, USA, 2001. ACM Press.
[24]
T. Yu, M. Winslett, and K. E. Seamons. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1--42, 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MG '08: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
January 2008
178 pages
ISBN:9781595938350
DOI:10.1145/1341811
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • National e-Science Institute (Edinburgh, UK)
  • Louisiana State University (USA)

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 January 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. e-health
  3. trust negotiation

Qualifiers

  • Research-article

Conference

Mardi Gras'08
Sponsor:
Mardi Gras'08: 15th Mardi Gras Conference on Distributed Applications
January 29 - February 3, 2008
Louisiana, Baton Rouge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Securing Smart Connected World: Key Challenges and Possible SolutionsSmart Connected World10.1007/978-3-030-76387-9_5(91-106)Online publication date: 28-Sep-2021
  • (2014)Issues and Challenges in Securing eHealth SystemsInternational Journal of E-Health and Medical Communications10.4018/ijehmc.20140101015:1(1-19)Online publication date: 1-Jan-2014
  • (2014)Access control for cloud-based eHealth social networkingSecurity and Communication Networks10.1002/sec.7597:3(574-587)Online publication date: 1-Mar-2014
  • (2011)TOWARD MULTI-SERVICE ELECTRONIC MEDICAL RECORDS STRUCTUREBiomedical Engineering10.1007/978-1-4614-0116-2_19(243-254)Online publication date: 12-Aug-2011
  • (2010)Modeling and negotiating service qualityService research challenges and solutions for the future internet10.5555/1985668.1985674(157-208)Online publication date: 1-Jan-2010
  • (2009)Emerging Trends in Health Care DeliveryProceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII10.1007/978-3-642-03007-9_19(283-290)Online publication date: 13-Jul-2009
  • (2008)Towards Decentralised Security Policies for e-Health CollaborationsProceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies10.1109/SECURWARE.2008.15(165-172)Online publication date: 25-Aug-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media