Automated Trust Negotiation in Autonomic Environments

  • Andreas Klenk
  • Frank Petri
  • Benoit Radier
  • Mikael Salaun
  • Georg Carle
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4725)


Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devices with no prior trust relationship. They can reach an agreement by iteratively exchanging credentials during a negotiation process. These credentials can serve as authorization tokens or may carry information that becomes a parameter of the further service usage. A careful negotiation strategy helps in protecting sensitive credentials that must only be available to authorized entities. We introduce the VersaTrust framework that supports a stateless negotiation protocol to reach comprehensive agreements. We argue how this approach applies to autonomic environments and demonstrate its scalability.


attribute-based access control stateless automated trust negotiation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust Negotiations: Concepts, Systems, and Languages. Computing in Science and Engineering 06(4), 27–34 (2004)CrossRefGoogle Scholar
  2. 2.
    Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering 16(7), 827–842 (2004)CrossRefGoogle Scholar
  3. 3.
    Bui, H., Venkatesh, S., Kieronska, D.: An architecture for negotiating agents that learn (1995)Google Scholar
  4. 4.
    Chess, D.M., Palmer, C., White, S.R.: Security in an autonomic computing environment. IBM Syst. J. 42(1), 107–118 (2003)CrossRefGoogle Scholar
  5. 5.
    Andrieux, A., et al.: Web Services Agreement Negotiation Specification (WS-AgreementNegotiation). Technical report, Global Grid Forum (2007)Google Scholar
  6. 6.
    Frikken, K.B., Li, J., Atallah, M.J.: Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA. The Internet Society (2006)Google Scholar
  7. 7.
    Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Syst. J. 42(1), 5–18 (2003)Google Scholar
  8. 8.
    Li, N., Winsborough, W.: Towards Practical Automated Trust Negotiation. In: POLICY 2002. Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, p. 92. IEEE Computer Society Press, Washington (2002)Google Scholar
  9. 9.
    Lopes, F., Mamede, N., Novais, A.Q., Coelho, H.: A negotiation model for autonomous computational agents: Formal description and empirical evaluation (2002)Google Scholar
  10. 10.
    Nejdl, W., Olmedilla, D., Winslett, M.: PeerTrust: automated trust negotiation for peers on the semantic web (2003)Google Scholar
  11. 11.
    Olson, L., Winslett, M., Tonti, G., Seeley, N., Uszok, A., Bradshaw, J.: Trust Negotiation as an Authorization Service for Web Services. In: ICDEW 2006. Proceedings of the 22nd International Conference on Data Engineering Workshops, IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  12. 12.
    Smith, B., Seamons, K.E., Jones, M.D.: Responding to Policies at Runtime in TrustBuilder. In: POLICY, pp. 149–158 (2004)Google Scholar
  13. 13.
    Winsborough, W., Seamons, K., Jones, V.: Automated Trust Negotiation. Technical report, North Carolina State University at Raleigh, Raleigh, NC, USA (2000)Google Scholar
  14. 14.
    Winsborough, W.H., Li, N.: Protecting sensitive attributes in automated trust negotiation. In: WPES 2002. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pp. 41–51. ACM Press, New York (2002)CrossRefGoogle Scholar
  15. 15.
    Yamaki, H., Fujii, M., Nakatsuka, K., Ishida, T.: A Dynamic Programming Approach to Automated Trust Negotiation for Multiagent Systems. rrs, 0:55–66 (2005)Google Scholar
  16. 16.
    Ye, S., Makedon, F., Ford, J.: Collaborative Automated Trust Negotiation in Peer-to-Peer Systems. In: P2P 2004. Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 108–115. IEEE Computer Society Press, Washington, DC (2004)Google Scholar
  17. 17.
    Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: CCS 2001. Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 146–155. ACM Press, New York (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Andreas Klenk
    • 1
  • Frank Petri
    • 1
  • Benoit Radier
    • 2
  • Mikael Salaun
    • 2
  • Georg Carle
    • 1
  1. 1.Wilhelm-Schickard-Institut, Sand 13, 72076 TübingenGermany
  2. 2.France Télécom R&D, avenue Pierre Marzin 2, 22307 LannionFrance

Personalised recommendations