Trust Negotiation in Dynamic Coalitions
Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control polici...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 245 vol.2 |
---|---|
container_issue | |
container_start_page | 240 |
container_title | |
container_volume | 2 |
creator | Seamons, K.E. Winslett, M. Ting Yu Chan, T. Child, E. Halcrow, M. Hess, A. Holt, J. Jacobson, J. Jarvis, R. Smith, B. Sundelin, T. Lina Yu |
description | Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder. |
doi_str_mv | 10.1109/DISCEX.2003.1194972 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1194972</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1194972</ieee_id><sourcerecordid>1194972</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-37bd4717d6f26ff2e51543d70b316d468f3dd54a64bc6cb35af75e6f360c7b863</originalsourceid><addsrcrecordid>eNotj7FuwjAURS1VlUA0X8CSjSnUzrPfi8cq0BYJtQMZ2JAd28gVJFWcDvx9U5W7nKszXOkythR8LQTXz5vdod4e1yXnMAktNZUPLNNUcUKtRDW1GctS-uJTQEsBas5WzfCTxvzDn_sxmjH2XR67fHPrzDW2ed2bS_yT6Yk9BnNJPrtzwZrXbVO_F_vPt139si-i5mMBZJ0kQQ5DiSGUXgklwRG3INBJrAI4p6RBaVtsLSgTSHkMgLwlWyEs2PJ_NnrvT99DvJrhdrq_gV_05D92</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Negotiation in Dynamic Coalitions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</creator><creatorcontrib>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</creatorcontrib><description>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</description><identifier>ISBN: 9780769518978</identifier><identifier>ISBN: 0769518974</identifier><identifier>DOI: 10.1109/DISCEX.2003.1194972</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Electrical capacitance tomography ; Jacobian matrices ; Licenses ; Open systems ; Protection ; Qualifications ; Rivers ; Sun ; Web server</subject><ispartof>Proceedings DARPA Information Survivability Conference and Exposition, 2003, Vol.2, p.240-245 vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1194972$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,4036,4037,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1194972$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Seamons, K.E.</creatorcontrib><creatorcontrib>Winslett, M.</creatorcontrib><creatorcontrib>Ting Yu</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Child, E.</creatorcontrib><creatorcontrib>Halcrow, M.</creatorcontrib><creatorcontrib>Hess, A.</creatorcontrib><creatorcontrib>Holt, J.</creatorcontrib><creatorcontrib>Jacobson, J.</creatorcontrib><creatorcontrib>Jarvis, R.</creatorcontrib><creatorcontrib>Smith, B.</creatorcontrib><creatorcontrib>Sundelin, T.</creatorcontrib><creatorcontrib>Lina Yu</creatorcontrib><title>Trust Negotiation in Dynamic Coalitions</title><title>Proceedings DARPA Information Survivability Conference and Exposition</title><addtitle>DISCEX</addtitle><description>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</description><subject>Access control</subject><subject>Electrical capacitance tomography</subject><subject>Jacobian matrices</subject><subject>Licenses</subject><subject>Open systems</subject><subject>Protection</subject><subject>Qualifications</subject><subject>Rivers</subject><subject>Sun</subject><subject>Web server</subject><isbn>9780769518978</isbn><isbn>0769518974</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj7FuwjAURS1VlUA0X8CSjSnUzrPfi8cq0BYJtQMZ2JAd28gVJFWcDvx9U5W7nKszXOkythR8LQTXz5vdod4e1yXnMAktNZUPLNNUcUKtRDW1GctS-uJTQEsBas5WzfCTxvzDn_sxmjH2XR67fHPrzDW2ed2bS_yT6Yk9BnNJPrtzwZrXbVO_F_vPt139si-i5mMBZJ0kQQ5DiSGUXgklwRG3INBJrAI4p6RBaVtsLSgTSHkMgLwlWyEs2PJ_NnrvT99DvJrhdrq_gV_05D92</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Seamons, K.E.</creator><creator>Winslett, M.</creator><creator>Ting Yu</creator><creator>Chan, T.</creator><creator>Child, E.</creator><creator>Halcrow, M.</creator><creator>Hess, A.</creator><creator>Holt, J.</creator><creator>Jacobson, J.</creator><creator>Jarvis, R.</creator><creator>Smith, B.</creator><creator>Sundelin, T.</creator><creator>Lina Yu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Trust Negotiation in Dynamic Coalitions</title><author>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-37bd4717d6f26ff2e51543d70b316d468f3dd54a64bc6cb35af75e6f360c7b863</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Access control</topic><topic>Electrical capacitance tomography</topic><topic>Jacobian matrices</topic><topic>Licenses</topic><topic>Open systems</topic><topic>Protection</topic><topic>Qualifications</topic><topic>Rivers</topic><topic>Sun</topic><topic>Web server</topic><toplevel>online_resources</toplevel><creatorcontrib>Seamons, K.E.</creatorcontrib><creatorcontrib>Winslett, M.</creatorcontrib><creatorcontrib>Ting Yu</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Child, E.</creatorcontrib><creatorcontrib>Halcrow, M.</creatorcontrib><creatorcontrib>Hess, A.</creatorcontrib><creatorcontrib>Holt, J.</creatorcontrib><creatorcontrib>Jacobson, J.</creatorcontrib><creatorcontrib>Jarvis, R.</creatorcontrib><creatorcontrib>Smith, B.</creatorcontrib><creatorcontrib>Sundelin, T.</creatorcontrib><creatorcontrib>Lina Yu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Seamons, K.E.</au><au>Winslett, M.</au><au>Ting Yu</au><au>Chan, T.</au><au>Child, E.</au><au>Halcrow, M.</au><au>Hess, A.</au><au>Holt, J.</au><au>Jacobson, J.</au><au>Jarvis, R.</au><au>Smith, B.</au><au>Sundelin, T.</au><au>Lina Yu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Negotiation in Dynamic Coalitions</atitle><btitle>Proceedings DARPA Information Survivability Conference and Exposition</btitle><stitle>DISCEX</stitle><date>2003</date><risdate>2003</risdate><volume>2</volume><spage>240</spage><epage>245 vol.2</epage><pages>240-245 vol.2</pages><isbn>9780769518978</isbn><isbn>0769518974</isbn><abstract>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</abstract><pub>IEEE</pub><doi>10.1109/DISCEX.2003.1194972</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769518978 |
ispartof | Proceedings DARPA Information Survivability Conference and Exposition, 2003, Vol.2, p.240-245 vol.2 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1194972 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Electrical capacitance tomography Jacobian matrices Licenses Open systems Protection Qualifications Rivers Sun Web server |
title | Trust Negotiation in Dynamic Coalitions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T15%3A50%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Negotiation%20in%20Dynamic%20Coalitions&rft.btitle=Proceedings%20DARPA%20Information%20Survivability%20Conference%20and%20Exposition&rft.au=Seamons,%20K.E.&rft.date=2003&rft.volume=2&rft.spage=240&rft.epage=245%20vol.2&rft.pages=240-245%20vol.2&rft.isbn=9780769518978&rft.isbn_list=0769518974&rft_id=info:doi/10.1109/DISCEX.2003.1194972&rft_dat=%3Cieee_6IE%3E1194972%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1194972&rfr_iscdi=true |