Modularized Trust Management For Distributed Coalition Environments
نویسنده
چکیده
Trust Management in distributed systems incorporates partially independent mechanisms to enable collaboration in distributed coalition environment. These modules can be distinguished by their characteristics of independent functionality, providing access control mechanism in decentralized environment, and discovery and management of credential documents including validation and revocation services in distributed context. While a variety of credential validation and transitive trust models have been developed that provide a wide range of semantics including conveyance of credential revocation, currently available trust management systems are paired to a particular certificate validation scheme with a particular transitive trust model. Furthermore, these systems are typically integrated in an ad-hoc manner that restricts the inclusion of alternative components. For example, the various trust management systems presently available provide different model of trust management paired with particular mechanism for credential validation and/or discovery. This pairing not only limits the versatility of the resulting access control frameworks to contexts where both are well suited to the application domain, but also imposes a high implementation cost for investigators and implementers considering alternative abstractions and pairings. Also it restricts the opportunity of configuring a custom trust management system, based on specific requirements, built upon a generic trust management framework. Thus, redesigning of trust management systems as a generic framework of modules remains to be an open problem that needs to be evaluated. VPAF (a Validated and Prolonged Authorization Framework) will separate these components in a manner that permits credential validation and authorization decisions to be managed separately. VPAF is intended to enable vigilant monitoring of prolonged authorization relationships that span mutually distrustful administrative domains such as is common when multiple organizations collaborate.
منابع مشابه
DisCo: A Distribution Infrastructure for Securely Deploying Decomposable Services in Partly Trusted Environments (TR2001-820)
The growing popularity of network-based services and peer-to-peer networks has resulted in situations where components of a distributed application often need to execute in environments that are only partly trusted by the application’s owner. Such deployment into partial or unstable trust environments exacerbates the classical problems of distributing decomposable services: authentication and a...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملCredentialed Secure Communication “Switchboards” (TR2001-821)
Software development in distributed computation is complicated by the extra overhead of communication between connected, dispersed hosts in dynamically changing, multiple administrative domains. Many disparate technologies exist for trust management, authentication, secure communication channels, and service discovery, but composing all of these elements into a single system can outweigh princi...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009