Advertisement

Trust Negotiation with Nonmonotonic Access Policies

  • Phan Minh Dung
  • Phan Minh Thang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3283)

Abstract

We study the structure of nonmonotonic access policies for internet-based resources. We argue that such policies could be divided into two parts: the locally designed policies and imported policies. Imported policies should always be monotonic while the local policies could be nonmonotonic. We develop a safe proof procedure for nonmonotonic trust negotiation where safety means that access to a resource is granted only if its access policy is satisfied.

Keywords

Policy Language Logic Programming Prefer Customer Trust Management Access Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th IEEE Symposium on Security and Privacy, Oakland, CA (May 1996)Google Scholar
  2. 2.
    Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254–274. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Bonatti, P.A., Samarati, P.: A Uniform Framework for Regulating Service Access and Information Release on the Web. In: Conference on Computer and Communication Security, Athens, Greece (2000)Google Scholar
  4. 4.
    Dung, P.M.: Negation as hypothesis: an argument-based foundation for logic programming. Journal of Logic Programming (1994)Google Scholar
  5. 5.
    Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Bowen, K., Kowalski, R.A. (eds.) iclp5th, Washington, Seattle, pp. 1070–1080 (1988)Google Scholar
  6. 6.
    Herzberg, A., Golan, I., Omer, O., Mass, Y.: An efficient algorithm for establishing trust in strangers, http://www.cs.biu.ac.il/~herzbea/Papers/PKI/ec01-paper.pdf
  7. 7.
    Hess, A., Smith, B., Jacobson, J., Seamons, K.E., Winslett, M., Yu, L., Yu, T.: Negotiating Trust on the Web. In: IEEE Internet Computing, November 2002, pp. 30–37. IEEE Press, Los Alamitos (2002)Google Scholar
  8. 8.
    Li, N., Winsborough, W.H.: Towards Practial Automated Trust Negotiation. In: IEEE 3rd Intl. Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Press, Los Alamitos (2002)Google Scholar
  9. 9.
    Ma, X., Winslett, M., Yu, T.: Prunes: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet. In: Proceeding of Seventh ACM Conference on Computer and Communications Security(CCS-7), pp. 210–219. ACM Press, New York (2000)Google Scholar
  10. 10.
    Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a Role-based Trust-management Framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)Google Scholar
  11. 11.
    Mitchell, J.C., Li, N., Winsborough, W.H.: Distributed Credential Chain Discovery in Trust Management. In: Proceeding of Eighth ACM Conference on Computer and Communications Security(CCS-8), pp. 156–165. ACM Press, New York (2001)Google Scholar
  12. 12.
    Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks (June 2002)Google Scholar
  13. 13.
    Yu, T., Winslett, M.: An Unified Scheme for Resource Protection in Automated Trust Negotiation. In: IEEE Symposium on Security and Privacy (May 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Phan Minh Dung
    • 1
  • Phan Minh Thang
    • 1
  1. 1.Department of Computer ScienceAsian Institute of TechnologyKlong Luang, PathumthaniThailand

Personalised recommendations