About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Communications and Networking in China

Research Article

A Logic Predicate Based Automated Trust Negotiation Model

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469417,
        author={Zhensong Liao and Hai Jin and Deqing Zou},
        title={A Logic Predicate Based Automated Trust Negotiation Model},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Access control  Computer networks  Computer security  Costs  Grid computing  Information security  Logic  Mobile computing  Privacy  Protection},
        doi={10.1109/CHINACOM.2007.4469417}
    }
    
  • Zhensong Liao
    Hai Jin
    Deqing Zou
    Year: 2008
    A Logic Predicate Based Automated Trust Negotiation Model
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469417
Zhensong Liao1, Hai Jin1,*, Deqing Zou1
  • 1: Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology, Wuhan, 430074, China
*Contact email: hjin@mail.hust.edu.cn

Abstract

Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and mobile access control policies specifying what combinations of credentials a stranger must submit. As an access control policy may contain sensitive information, the negotiation process becomes complicated in order to prevent information leakage. Furthermore, since ATN is a type of access control mechanism, it is difficult to be described by formalization languages, therefore it has a low security level. To solve these problems, a Logic Predicate Based ATN Model (LPBM) is proposed in this paper. LPBM decomposes a compound policy into meta policies and provides suitable rules to simplify them. While doing this, LPBM can check policy consistency. In addition, a set of logic predicates are presented to describe the negotiation process. Agent is introduced to perform the negotiation on behalf of negotiators. A use case is studied to show that LPBM is sound and reasonable.

Keywords
Access control Computer networks Computer security Costs Grid computing Information security Logic Mobile computing Privacy Protection
Published
2008-03-07
Publisher
IEEE
Modified
2011-07-12
http://dx.doi.org/10.1109/CHINACOM.2007.4469417
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL