Trust Negotiation in Dynamic Coalitions

Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control polici...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Seamons, K.E., Winslett, M., Ting Yu, Chan, T., Child, E., Halcrow, M., Hess, A., Holt, J., Jacobson, J., Jarvis, R., Smith, B., Sundelin, T., Lina Yu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 245 vol.2
container_issue
container_start_page 240
container_title
container_volume 2
creator Seamons, K.E.
Winslett, M.
Ting Yu
Chan, T.
Child, E.
Halcrow, M.
Hess, A.
Holt, J.
Jacobson, J.
Jarvis, R.
Smith, B.
Sundelin, T.
Lina Yu
description Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.
doi_str_mv 10.1109/DISCEX.2003.1194972
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1194972</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1194972</ieee_id><sourcerecordid>1194972</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-37bd4717d6f26ff2e51543d70b316d468f3dd54a64bc6cb35af75e6f360c7b863</originalsourceid><addsrcrecordid>eNotj7FuwjAURS1VlUA0X8CSjSnUzrPfi8cq0BYJtQMZ2JAd28gVJFWcDvx9U5W7nKszXOkythR8LQTXz5vdod4e1yXnMAktNZUPLNNUcUKtRDW1GctS-uJTQEsBas5WzfCTxvzDn_sxmjH2XR67fHPrzDW2ed2bS_yT6Yk9BnNJPrtzwZrXbVO_F_vPt139si-i5mMBZJ0kQQ5DiSGUXgklwRG3INBJrAI4p6RBaVtsLSgTSHkMgLwlWyEs2PJ_NnrvT99DvJrhdrq_gV_05D92</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trust Negotiation in Dynamic Coalitions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</creator><creatorcontrib>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</creatorcontrib><description>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</description><identifier>ISBN: 9780769518978</identifier><identifier>ISBN: 0769518974</identifier><identifier>DOI: 10.1109/DISCEX.2003.1194972</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Electrical capacitance tomography ; Jacobian matrices ; Licenses ; Open systems ; Protection ; Qualifications ; Rivers ; Sun ; Web server</subject><ispartof>Proceedings DARPA Information Survivability Conference and Exposition, 2003, Vol.2, p.240-245 vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1194972$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,4036,4037,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1194972$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Seamons, K.E.</creatorcontrib><creatorcontrib>Winslett, M.</creatorcontrib><creatorcontrib>Ting Yu</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Child, E.</creatorcontrib><creatorcontrib>Halcrow, M.</creatorcontrib><creatorcontrib>Hess, A.</creatorcontrib><creatorcontrib>Holt, J.</creatorcontrib><creatorcontrib>Jacobson, J.</creatorcontrib><creatorcontrib>Jarvis, R.</creatorcontrib><creatorcontrib>Smith, B.</creatorcontrib><creatorcontrib>Sundelin, T.</creatorcontrib><creatorcontrib>Lina Yu</creatorcontrib><title>Trust Negotiation in Dynamic Coalitions</title><title>Proceedings DARPA Information Survivability Conference and Exposition</title><addtitle>DISCEX</addtitle><description>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</description><subject>Access control</subject><subject>Electrical capacitance tomography</subject><subject>Jacobian matrices</subject><subject>Licenses</subject><subject>Open systems</subject><subject>Protection</subject><subject>Qualifications</subject><subject>Rivers</subject><subject>Sun</subject><subject>Web server</subject><isbn>9780769518978</isbn><isbn>0769518974</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj7FuwjAURS1VlUA0X8CSjSnUzrPfi8cq0BYJtQMZ2JAd28gVJFWcDvx9U5W7nKszXOkythR8LQTXz5vdod4e1yXnMAktNZUPLNNUcUKtRDW1GctS-uJTQEsBas5WzfCTxvzDn_sxmjH2XR67fHPrzDW2ed2bS_yT6Yk9BnNJPrtzwZrXbVO_F_vPt139si-i5mMBZJ0kQQ5DiSGUXgklwRG3INBJrAI4p6RBaVtsLSgTSHkMgLwlWyEs2PJ_NnrvT99DvJrhdrq_gV_05D92</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Seamons, K.E.</creator><creator>Winslett, M.</creator><creator>Ting Yu</creator><creator>Chan, T.</creator><creator>Child, E.</creator><creator>Halcrow, M.</creator><creator>Hess, A.</creator><creator>Holt, J.</creator><creator>Jacobson, J.</creator><creator>Jarvis, R.</creator><creator>Smith, B.</creator><creator>Sundelin, T.</creator><creator>Lina Yu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Trust Negotiation in Dynamic Coalitions</title><author>Seamons, K.E. ; Winslett, M. ; Ting Yu ; Chan, T. ; Child, E. ; Halcrow, M. ; Hess, A. ; Holt, J. ; Jacobson, J. ; Jarvis, R. ; Smith, B. ; Sundelin, T. ; Lina Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-37bd4717d6f26ff2e51543d70b316d468f3dd54a64bc6cb35af75e6f360c7b863</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Access control</topic><topic>Electrical capacitance tomography</topic><topic>Jacobian matrices</topic><topic>Licenses</topic><topic>Open systems</topic><topic>Protection</topic><topic>Qualifications</topic><topic>Rivers</topic><topic>Sun</topic><topic>Web server</topic><toplevel>online_resources</toplevel><creatorcontrib>Seamons, K.E.</creatorcontrib><creatorcontrib>Winslett, M.</creatorcontrib><creatorcontrib>Ting Yu</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Child, E.</creatorcontrib><creatorcontrib>Halcrow, M.</creatorcontrib><creatorcontrib>Hess, A.</creatorcontrib><creatorcontrib>Holt, J.</creatorcontrib><creatorcontrib>Jacobson, J.</creatorcontrib><creatorcontrib>Jarvis, R.</creatorcontrib><creatorcontrib>Smith, B.</creatorcontrib><creatorcontrib>Sundelin, T.</creatorcontrib><creatorcontrib>Lina Yu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Seamons, K.E.</au><au>Winslett, M.</au><au>Ting Yu</au><au>Chan, T.</au><au>Child, E.</au><au>Halcrow, M.</au><au>Hess, A.</au><au>Holt, J.</au><au>Jacobson, J.</au><au>Jarvis, R.</au><au>Smith, B.</au><au>Sundelin, T.</au><au>Lina Yu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trust Negotiation in Dynamic Coalitions</atitle><btitle>Proceedings DARPA Information Survivability Conference and Exposition</btitle><stitle>DISCEX</stitle><date>2003</date><risdate>2003</risdate><volume>2</volume><spage>240</spage><epage>245 vol.2</epage><pages>240-245 vol.2</pages><isbn>9780769518978</isbn><isbn>0769518974</isbn><abstract>Military and business partners may need to conduct sensitive interactions on line, requiring members in a coalition to share sensitive resources with those outside their local security domain. Automated trust negotiation is an approach that accomplishes this, through the use of access control policies that specify what combinations of digital credentials a stranger must disclose to gain access to a coalition resource. The Trust Negotiation in Dynamic Coalitions project has focused on the theoretical underpinnings of trust negotiation as well as the design and implementation of TrustBuilder, an architecture that incorporates trust negotiation into standard network technologies. This paper summarizes the research contributions of this project to trust negotiation in the areas of sensitive access control policies, strategies, protocols, policy language requirements, and privacy protection. This paper also describes the basic design of TrustBuilder.</abstract><pub>IEEE</pub><doi>10.1109/DISCEX.2003.1194972</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769518978
ispartof Proceedings DARPA Information Survivability Conference and Exposition, 2003, Vol.2, p.240-245 vol.2
issn
language eng
recordid cdi_ieee_primary_1194972
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Electrical capacitance tomography
Jacobian matrices
Licenses
Open systems
Protection
Qualifications
Rivers
Sun
Web server
title Trust Negotiation in Dynamic Coalitions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T15%3A50%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trust%20Negotiation%20in%20Dynamic%20Coalitions&rft.btitle=Proceedings%20DARPA%20Information%20Survivability%20Conference%20and%20Exposition&rft.au=Seamons,%20K.E.&rft.date=2003&rft.volume=2&rft.spage=240&rft.epage=245%20vol.2&rft.pages=240-245%20vol.2&rft.isbn=9780769518978&rft.isbn_list=0769518974&rft_id=info:doi/10.1109/DISCEX.2003.1194972&rft_dat=%3Cieee_6IE%3E1194972%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1194972&rfr_iscdi=true