- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
ABSTRACT Policy Migration for Sensitive Credentials in Trust Negotiation
Policy Migration for Sensitive Credentials in Trust
Negotiation
Ting Yu
Department of Computer Science
North Carolina State University
yu@
Marianne Winslett
Department of Computer Science
University of Illinois at Urbana-Champaign
winslett@
ABSTRACT
Trust negotiation is an approach to establishing trust be-
tween strangers through the bilateral, iterative disclosure of
digital credentials. Under automated trust negotiation, ac-
cess control policies are associated with sensitive credentials
to control under what circumstances those credentials can
be disclosed. Ideally, the information in a user’s sensitive
credential should not be known by others unless the cor-
responding policy is satisfied. However, the original model
for user interaction in trust negotiation has pitfalls which
can be easily exploited to infer one’s private information,
even if access control policies are strictly enforced. To pre-
serve one’s privacy, a more flexible interaction model for
trust negotiation is required. On the other hand, it is also
desirable for two parties to be able to establish trust when-
ever possible. There is potentially a conflict between privacy
preservation and the assurance of a successful trust negotia-
tion. In this paper, we identify the situation where sensitive
information can be inferred through observing one’s behav-
ior in trust negotiation. Then we propose policy migration
as one approach to preventing such inference. Compared
to previously proposed approaches, policy migration has a
low management overhead, and provides a nice balance be-
tween inference prevention and guarantees of success in trust
establishment. We also discuss the limitations of policy mi-
gration, and possible directions for more comprehensive so-
lutions.
Categories and Subject Descriptors
K.6.5 [Management of Computing and Information
Systems]: Security and Protection
General Terms
Security
Keywords
trust negotiation, policy migration
Permission to make digital or hard copies of all o
您可能关注的文档
- 7B U10 5.16.doc
- 7B Unit6 Comic strip.doc
- 8 An Overview of OntoClean.pdf
- 83020012A,SNJ54ALS373AFK, 规格书,Datasheet 资料.pdf
- 85005-0099 -- EST2 Network Control.pdf
- 88种蔬菜中英文名称.pdf
- 8Aunit 1 comic strip.doc
- 8Aunit 3 comic strip.doc
- 8B Unit 1 Comic strip & Welcome to.ppt
- 8B Unit7 Period1(Comic strip & Welcome to the unit).doc
- ABSTRACT SYSTEM REVIEW OF THE MODIFIED LIGHT DUTY UTILITY ARM AFTER THE COMPLETION OF THE N.pdf
- ABSTRACT. ABSOLUTE LAX 2-CATEGORIES.pdf
- Abundance gradient in Local Group galaxies using Asymptotic Giant Branch stars.pdf
- ACCA F1的错题集精选.pdf
- Abstract The Imitation Game (Alan M. Turing, 1950), now.pdf
- Accelerated Particles from Shocks Formed in Merging Clusters of Galaxies.pdf
- Accomplishments and Challenges in the Chesapeake Bay Program Watershed and Estuary Models.pdf
- Accretion of a satellite onto a spherical galaxy. II. Binary evolution and orbital decay.pdf
- Accretion of gas onto nearby spiral galaxies.pdf
- Accuracy of the Residual Delay Absolute Phase Algorithm.pdf
文档评论(0)