A unified scheme for resource protection in automated trust negotiation

Ting Yu, Marianne Winslett

Research output: Chapter in Book/Report/Conference proceedingConference contribution

120 Citations (Scopus)

Abstract

Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the parry requesting access to the resource, when trust negotiation starts. The negotiating parties can rely on policy disclosures to learn each other's access control requirements. However, a policy itself may also contain sensitive information. Disclosing policies' contents unconditionally may leak valuable business information or jeopardize individuals' privacy. In this paper, we propose UniPro, a unified scheme to model protection of resources, including policies, in trust negotiation. UniPro improves on previous work by modeling policies as first-class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction, which gives users more flexibility in expressing their authorization requirements. We also show that UniPro can be used with practical negotiation strategies without jeopardizing autonomy in the choice of strategy, and present criteria under which negotiations using UniPro are guaranteed to succeed in establishing trust.

Original languageEnglish
Title of host publicationProceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
Pages110-122
Number of pages13
Publication statusPublished - 2003
Externally publishedYes
Event2003 IEEE Symposium on Security And Privacy - Berkeley, CA, United States
Duration: 11 May 200314 May 2003

Other

Other2003 IEEE Symposium on Security And Privacy
CountryUnited States
CityBerkeley, CA
Period11/5/0314/5/03

Fingerprint

Access control
Industry

ASJC Scopus subject areas

  • Software

Cite this

Yu, T., & Winslett, M. (2003). A unified scheme for resource protection in automated trust negotiation. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (pp. 110-122)

A unified scheme for resource protection in automated trust negotiation. / Yu, Ting; Winslett, Marianne.

Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2003. p. 110-122.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yu, T & Winslett, M 2003, A unified scheme for resource protection in automated trust negotiation. in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. pp. 110-122, 2003 IEEE Symposium on Security And Privacy, Berkeley, CA, United States, 11/5/03.
Yu T, Winslett M. A unified scheme for resource protection in automated trust negotiation. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2003. p. 110-122
Yu, Ting ; Winslett, Marianne. / A unified scheme for resource protection in automated trust negotiation. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2003. pp. 110-122
@inproceedings{8570ec1ec0424c1fba8b444c191dfcf0,
title = "A unified scheme for resource protection in automated trust negotiation",
abstract = "Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the parry requesting access to the resource, when trust negotiation starts. The negotiating parties can rely on policy disclosures to learn each other's access control requirements. However, a policy itself may also contain sensitive information. Disclosing policies' contents unconditionally may leak valuable business information or jeopardize individuals' privacy. In this paper, we propose UniPro, a unified scheme to model protection of resources, including policies, in trust negotiation. UniPro improves on previous work by modeling policies as first-class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction, which gives users more flexibility in expressing their authorization requirements. We also show that UniPro can be used with practical negotiation strategies without jeopardizing autonomy in the choice of strategy, and present criteria under which negotiations using UniPro are guaranteed to succeed in establishing trust.",
author = "Ting Yu and Marianne Winslett",
year = "2003",
language = "English",
pages = "110--122",
booktitle = "Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy",

}

TY - GEN

T1 - A unified scheme for resource protection in automated trust negotiation

AU - Yu, Ting

AU - Winslett, Marianne

PY - 2003

Y1 - 2003

N2 - Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the parry requesting access to the resource, when trust negotiation starts. The negotiating parties can rely on policy disclosures to learn each other's access control requirements. However, a policy itself may also contain sensitive information. Disclosing policies' contents unconditionally may leak valuable business information or jeopardize individuals' privacy. In this paper, we propose UniPro, a unified scheme to model protection of resources, including policies, in trust negotiation. UniPro improves on previous work by modeling policies as first-class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction, which gives users more flexibility in expressing their authorization requirements. We also show that UniPro can be used with practical negotiation strategies without jeopardizing autonomy in the choice of strategy, and present criteria under which negotiations using UniPro are guaranteed to succeed in establishing trust.

AB - Automated trust negotiation is an approach to establishing trust between strangers through iterative disclosure of digital credentials. In automated trust negotiation, access control policies play a key role in protecting resources from unauthorized access. Unlike in traditional trust management systems, the access control policy for a resource is usually unknown to the parry requesting access to the resource, when trust negotiation starts. The negotiating parties can rely on policy disclosures to learn each other's access control requirements. However, a policy itself may also contain sensitive information. Disclosing policies' contents unconditionally may leak valuable business information or jeopardize individuals' privacy. In this paper, we propose UniPro, a unified scheme to model protection of resources, including policies, in trust negotiation. UniPro improves on previous work by modeling policies as first-class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction, which gives users more flexibility in expressing their authorization requirements. We also show that UniPro can be used with practical negotiation strategies without jeopardizing autonomy in the choice of strategy, and present criteria under which negotiations using UniPro are guaranteed to succeed in establishing trust.

UR - http://www.scopus.com/inward/record.url?scp=0038148412&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0038148412&partnerID=8YFLogxK

M3 - Conference contribution

SP - 110

EP - 122

BT - Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy

ER -