Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations

نویسندگان

  • Philipp Kärger
  • Daniel Olmedilla
  • Wolf-Tilo Balke
چکیده

Business processes in open distributed environments such as the Web force users to interact with other parties be it users or companies even if they have never had any common transaction in the past. Policy-driven trust negotiations emerged in order to address these situations. But although many policy languages and protocols have been defined, the problem of deciding which credential disclosure set to choose from those that possibly make a negotiation succeed is still subject of research. This paper explores the use of qualitative preferences in order to solve the problem and exploits the recently introduced notions of amalgamated and incremented preferences in order to allow for automated decisions which negotiations are preferred by the user. Our solution eases the task for the user of selection among all possible negotiations by removing irrelevant alternatives and it may even automatize negotiations that otherwise would require manual intervention.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Unified Scheme for Resource Protection in Automated Trust Negotiation

Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the party requesting access ...

متن کامل

Anonymity Preserving Techniques in Trust Negotiations

Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attributes the counterpart has to provide to obtain a given resource. The counterpart, in response, provides a disclosure set containing the necessary credentials and attributes. If the counterpart wants to remain anonymous,...

متن کامل

Advanced Semantic Web Policies: Evolution, Reactivity, and Priorities

Semantic Web policies are statements that define the behavior of a system acting on the Semantic Web. It turned out that current policy frameworks lack important features in both, their representation and their reasoning facilities. They typically do not allow for dynamics such as evolution, i.e., the consistent modification of the policy while it is evaluated at the same time, and reactivity, ...

متن کامل

Protecting Sensitive Credential Content during Trust Negotiation

PROTECTING SENSITIVE CREDENTIAL CONTENT DURING TRUST NEGOTIATION Ryan D. Jarvis Department of Computer Science Master of Science Keeping sensitive information private in a public world is a common concern to users of digital credentials. A digital credential may contain sensitive attributes certifying characteristics about its owner. X.509v3, the most widely used certificate standard, includes ...

متن کامل

Privacy Friendly Information Disclosure

When using electronic services, people are often asked to provide personal information. This raises many privacy issues. To gain the trust of the user, service providers can use privacy policy languages such as P3P to declare the purpose and usage of this personal information. User agents can compare these policies to privacy preferences of a user and warn the user if his privacy is threatened....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008