Protecting privacy during on-line trust negotiation

Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Citations (Scopus)

Abstract

The dramatic growth of services and information on the Internet is accompanied by growing concerns over privacy. Trust negotiation is a new approach to establishing trust between strangers on the Internet through the bilateral exchange of digital credentials, the on-line analogue to the paper credentials people carry in their wallets today. When a credential contains sensitive information, its disclosure is governed by an access control policy that specifies credentials that must be received before the sensitive credential is disclosed. This paper identifies the privacy vulnerabilities present in on-line trust negotiation and the approaches that can be taken to eliminate or minimize those vulnerabilities. The paper proposes modifications to negotiation strategies to help prevent the inadvertent disclosure of credential information during online trust negotiation for those credentials or credential attributes that have been designated as sensitive, private information.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages129-143
Number of pages15
Volume2482
ISBN (Print)354000565X, 9783540005650
Publication statusPublished - 2003
Externally publishedYes
Event2nd International Workshop on Privacy Enhancing Technologies, PET 2002 - San Francisco, United States
Duration: 14 Apr 200215 Apr 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2482
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Workshop on Privacy Enhancing Technologies, PET 2002
CountryUnited States
CitySan Francisco
Period14/4/0215/4/02

Fingerprint

Privacy
Internet
Disclosure
Vulnerability
Access control
Private Information
Control Policy
Access Control
Eliminate
Attribute
Analogue
Minimise

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Seamons, K. E., Winslett, M., Yu, T., Yu, L., & Jarvis, R. (2003). Protecting privacy during on-line trust negotiation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2482, pp. 129-143). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2482). Springer Verlag.

Protecting privacy during on-line trust negotiation. / Seamons, Kent E.; Winslett, Marianne; Yu, Ting; Yu, Lina; Jarvis, Ryan.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2482 Springer Verlag, 2003. p. 129-143 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2482).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seamons, KE, Winslett, M, Yu, T, Yu, L & Jarvis, R 2003, Protecting privacy during on-line trust negotiation. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 2482, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2482, Springer Verlag, pp. 129-143, 2nd International Workshop on Privacy Enhancing Technologies, PET 2002, San Francisco, United States, 14/4/02.
Seamons KE, Winslett M, Yu T, Yu L, Jarvis R. Protecting privacy during on-line trust negotiation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2482. Springer Verlag. 2003. p. 129-143. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Seamons, Kent E. ; Winslett, Marianne ; Yu, Ting ; Yu, Lina ; Jarvis, Ryan. / Protecting privacy during on-line trust negotiation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2482 Springer Verlag, 2003. pp. 129-143 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{db844b4761f84211831d8ed08bc7e415,
title = "Protecting privacy during on-line trust negotiation",
abstract = "The dramatic growth of services and information on the Internet is accompanied by growing concerns over privacy. Trust negotiation is a new approach to establishing trust between strangers on the Internet through the bilateral exchange of digital credentials, the on-line analogue to the paper credentials people carry in their wallets today. When a credential contains sensitive information, its disclosure is governed by an access control policy that specifies credentials that must be received before the sensitive credential is disclosed. This paper identifies the privacy vulnerabilities present in on-line trust negotiation and the approaches that can be taken to eliminate or minimize those vulnerabilities. The paper proposes modifications to negotiation strategies to help prevent the inadvertent disclosure of credential information during online trust negotiation for those credentials or credential attributes that have been designated as sensitive, private information.",
author = "Seamons, {Kent E.} and Marianne Winslett and Ting Yu and Lina Yu and Ryan Jarvis",
year = "2003",
language = "English",
isbn = "354000565X",
volume = "2482",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "129--143",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Protecting privacy during on-line trust negotiation

AU - Seamons, Kent E.

AU - Winslett, Marianne

AU - Yu, Ting

AU - Yu, Lina

AU - Jarvis, Ryan

PY - 2003

Y1 - 2003

N2 - The dramatic growth of services and information on the Internet is accompanied by growing concerns over privacy. Trust negotiation is a new approach to establishing trust between strangers on the Internet through the bilateral exchange of digital credentials, the on-line analogue to the paper credentials people carry in their wallets today. When a credential contains sensitive information, its disclosure is governed by an access control policy that specifies credentials that must be received before the sensitive credential is disclosed. This paper identifies the privacy vulnerabilities present in on-line trust negotiation and the approaches that can be taken to eliminate or minimize those vulnerabilities. The paper proposes modifications to negotiation strategies to help prevent the inadvertent disclosure of credential information during online trust negotiation for those credentials or credential attributes that have been designated as sensitive, private information.

AB - The dramatic growth of services and information on the Internet is accompanied by growing concerns over privacy. Trust negotiation is a new approach to establishing trust between strangers on the Internet through the bilateral exchange of digital credentials, the on-line analogue to the paper credentials people carry in their wallets today. When a credential contains sensitive information, its disclosure is governed by an access control policy that specifies credentials that must be received before the sensitive credential is disclosed. This paper identifies the privacy vulnerabilities present in on-line trust negotiation and the approaches that can be taken to eliminate or minimize those vulnerabilities. The paper proposes modifications to negotiation strategies to help prevent the inadvertent disclosure of credential information during online trust negotiation for those credentials or credential attributes that have been designated as sensitive, private information.

UR - http://www.scopus.com/inward/record.url?scp=84957811521&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84957811521&partnerID=8YFLogxK

M3 - Conference contribution

SN - 354000565X

SN - 9783540005650

VL - 2482

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 129

EP - 143

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -