Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Top Cited Papers
- 1 February 2003
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 6 (1) , 1-42
- https://doi.org/10.1145/605434.605435
Abstract
Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each other's local services and other local resources. Automated trust negotiation is an approach to establishing trust between parties so that such interactions can take place, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a local resource. A party can use many different strategies to negotiate trust, offering tradeoffs between the length of the negotiation, the amount of extraneous information disclosed, and the computational effort expended. To preserve parties' autonomy, each party should ideally be able to choose its negotiation strategy independently, while still being guaranteed that negotiations will succeed whenever possible---that the two parties' strategies will interoperate. In this paper we provide the formal underpinnings for that goal, by formalizing the concepts of negotiation protocols, strategies, and interoperation. We show how to model the information flow of a negotiation for use in analyzing strategy interoperation. We also present two large sets of strategies whose members all interoperate with one another, and show that these sets contain many practical strategies. We develop the theory for black-box propositional credentials as well as credentials with internal structure, and for access control policies whose contents are (respectively are not) sensitive. We also discuss how these results fit into TrustBuilder, our prototype system for trust negotiation.Keywords
This publication has 5 references indexed in Scilit:
- Relying Party Credentials FrameworkPublished by Springer Nature ,2001
- The KeyNote Trust-Management System Version 2Published by RFC Editor ,1999
- The Logic Programming ParadigmPublished by Springer Nature ,1999
- The TLS Protocol Version 1.0Published by RFC Editor ,1999
- A flexible security system for using Internet contentIEEE Software, 1997