Automated Trust Negotiation Using Cryptographic Credentials
Author
Jiangtao Li, Ninghui Li, William H. Winsborough
Tech report number
CERIAS TR 2005-129
Abstract
This paper introduced a framework for ATN in which the diverse credential schemes and protocols can be combined, integrated, and used as needed. A policy language is introduced that enables negotiators to specify authorization requirements that must be met by an opponent to receive various amounts of information about certified attributes and the credentials that contain it. The language also supports the use of uncertified attributes, allowing them to be required as part of policy satisfaction, and to place their (automatic) disclosure under policy control.
Address
Alexandria, Virginia
Key alpha
Privacy, Access Control, Automated Trust Negotiation, Digital Credentials
Series
Proceedings of 12th ACM Conference on Computer and Communications Security (CCS)
Publication Date
2005-11-01
Contents
1. Introduction
2. Related Work
3. Overview of cryptographic credentials and tools for ATN
4. The language of credentials and policies
5. The extended trust target graph (ETTG) protocol
6. Conclusion and future work
7. References
Subject
Security and Protection, Access Controls