Filters








34,344 Hits in 6.3 sec

Protecting Privacy during On-Line Trust Negotiation [chapter]

Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
2003 Lecture Notes in Computer Science  
This paper identifies the privacy vulnerabilities present in on-line trust negotiation and the approaches that can be taken to eliminate or minimize them.  ...  The paper proposes modifications to negotiation strategies to help prevent the inadvertent disclosure of credential information during on-line trust negotiation for those credentials or credential attributes  ...  Privacy vulnerabilities during trust negotiation This section presents four ways that privacy can be compromised during on-line trust negotiation.  ... 
doi:10.1007/3-540-36467-6_10 fatcat:l4sgfcb7ofcipgjxyir3txp2nu

PP-trust-X

A. Squicciarini, E. Bertino, Elena Ferrari, F. Paci, B. Thuraisingham
2007 ACM Transactions on Privacy and Security  
Today, privacy is one of the major concerns of users when exchanging information through the Web and thus we believe that trust negotiation systems must effectively address privacy issues in order to be  ...  For these reasons, in this paper, we investigate privacy in the context of trust negotiations.  ...  Figure 1 illustrates possible approaches to privacy protection during the different steps of a negotiation.  ... 
doi:10.1145/1266977.1266981 fatcat:uq2hye25djavfeexszronvr6ia

Mechanism of Minimum Credential Disclosure with Privacy Preserved in Trust Builder 2 Framework

Dhiraj Shrestha, Li Jianli
2012 Journal of clean energy technologies  
These approaches assure the privacy protection while undergoing Trust negotiation.  ...  Present credential disclosure technique requires disclosing more than one credential to establish a trust during Automated Trust Negotiation (ATN), which is time consuming and requires additional burden  ...  But the main drawback with TrustBuilder1 was it supports only one credential format, one policy language and one trust negotiation strategy.  ... 
doi:10.7763/ijcte.2012.v4.615 fatcat:ihmbhhtj4fa7vfqba2lkyp7hpa

Privacy-Aware Trust Negotiation [chapter]

Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
2016 Lecture Notes in Computer Science  
This paper follows this line and concentrates on the incorporation of trust negotiations during the requirements engineering phase.  ...  conflicts caused by trust negotiations.  ...  This paper presents a framework for identifying privacy threats caused by the uncontrolled disclosure of information during a trust negotiation.  ... 
doi:10.1007/978-3-319-46598-2_7 fatcat:4kwe45cabvh2na7h5odmzreuoq

Multidimensional array I/O in Panda 1.0

KentE. Seamons, Marianne Winslett
1996 Journal of Supercomputing  
Kuck Outstanding Doctoral Thesis Award at UIUC, an award based on the quality and impact of the work.  ...  respect to completeness, efficiency, privacy protection, and termination.  ...  The impact of this research is a principled understanding of trust negotiation that will empower individuals and organizations with scalable trust establishment approaches that protect privacy and sensitive  ... 
doi:10.1007/bf00130709 fatcat:hzfaspavkne6pcfg76nwpk7cpm

Policy Languages and Their Suitability for Trust Negotiation [chapter]

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
2018 Lecture Notes in Computer Science  
This paper aims to identify the most suitable policy language for trust negotiation. To do so, policy languages are analysed against a set of criteria for trust negotiation that are first established.  ...  The cooperation brings with it many new challenges and problems, among which one is the problem of trust. This area is also important for the Computer Science.  ...  It may be useful to support information granularity for trust negotiation, because the credential confidentiality levels can be controlled during their disclosure and thus protect the security and privacy  ... 
doi:10.1007/978-3-319-95729-6_5 fatcat:a7eohzvz4javreow2o4plravda

On-line privacy and consent

Lizzie Coles-Kemp, Elahe Kani-Zabihi
2010 Proceedings of the 2010 workshop on New security paradigms - NSPW '10  
As the focus is turned to on-line technologies, the design question becomes one of privacy protection not privacy negotiation and conflict resolution.  ...  The work presented in this paper forms the initial part of a study to learn more about the types of privacy dialogue and negotiation that should be deployed in on-line services.  ...  These protection technologies aim to build trust in a service by empowering users with an increased range of privacy protection options.  ... 
doi:10.1145/1900546.1900560 dblp:conf/nspw/Coles-KempK10 fatcat:cduwz7smpbbn5fhl6rarjkcfge

Where EAP security claims fail

Katrin Hoeper, Lidong Chen
2007 The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops - QSHINE '07  
, authentication and privacy of EAP communications.  ...  In particular, we present a series of attacks which cause some standard security claims, namely channel binding, protected ciphersuite negotiation and cryptobinding, to fail and compromise the key exchange  ...  Hence, protected ciphersuite negotiation requires an integrity check of the messages that have exchanged during the negotiation.  ... 
doi:10.1145/1577222.1577285 dblp:conf/qshine/HoeperC07 fatcat:rlmfrriavfc3vdnzoksuemxbni

Secure Mobile Agent-based E-Negotiation for On-Line Trading

Raja Al-Jaljouli, Jemal H. Abawajy
2007 2007 IEEE International Symposium on Signal Processing and Information Technology  
We also propose a security protocol that protects the autonomously choose the agent's itinerary based on the information exchanged between the mobile agents during e-acquired offers and the initiator's  ...  integrity of They transport from one host to another host through insecure exchanged information. channels and may execute on non-trusted hosts.  ...  Customers submit bids on the product at processes. on-line auctions and the negotiation continues till no higher I-------------------------------price is made since the last negotiation round.  ... 
doi:10.1109/isspit.2007.4458205 fatcat:mfg7f33tfbe4hmbznew4k2bdpq

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach

A.C. Squicciarini, E. Bertino, E. Ferrari, I. Ray
2006 IEEE Transactions on Dependable and Secure Computing  
These trust negotiation systems, however, by their nature, may represent a threat to privacy in that credentials, exchanged during negotiations, often contain sensitive personal information that may need  ...  Trust negotiation systems allow subjects in different security domains to securely exchange protected resources and services.  ...  Before starting the on line process, both negotiating subjects specify trust requirements for their resources.  ... 
doi:10.1109/tdsc.2006.3 fatcat:jbbiy7c6xzgzhi4mhkilveblv4

Bridging Trust Relationships with Web Service Enhancements

Zhengping Wu, Alfred Weaver
2006 2006 IEEE International Conference on Web Services (ICWS'06)  
Yet security, privacy and trust-related protection mechanisms for web services need additional development.  ...  This paper describes an indirect trust establishment mechanism to bridge and build new trust relationships from extant trust relationships providing privacy protection and owner control simultaneously.  ...  This trust relationship can be established via an on-line trust negotiation or a contract written in paper.  ... 
doi:10.1109/icws.2006.40 dblp:conf/icws/WuW06 fatcat:ke73oe2xdfa7bavetzaofwnopu

Combining access control and trust negotiations in an On-line Social Network

Stefano Braghin, Elena Ferrari, Alberto Trombetta
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web.  ...  In this paper, we show how access control and trust negotiation can be combined in a framework for the protection of OSN resources.  ...  Trust negotiation systems have also been investigated with respect to privacy. Work along this direction has focused on the protection of sensitive policies and credentials.  ... 
doi:10.4108/icst.collaboratecom.2010.18 dblp:conf/colcom/BraghinFT10 fatcat:pbcvbr64vbarrawy33xbs2okhu

An access control model for dynamic client-side content

Adam Hess, Kent E. Seamons
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We have implemented the model within TrustBuilder, an architecture for negotiating trust between strangers based on properties other than identity.  ...  The implementation is the first example of content-triggered trust negotiation and currently supports access control for sensitive content disclosed by web and email clients.  ...  The authors would like to thank Marianne Winslett for her helpful discussions on content-triggered trust negotiation and her feedback on earlier versions of this paper.  ... 
doi:10.1145/775412.775440 dblp:conf/sacmat/HessS03 fatcat:52dyoqj2wjefdi2kagelcg7yhe

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes [article]

Oriol Farràs, Josep Domingo-Ferrer, Alberto Blanco-Justicia
2013 arXiv   pre-print
During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment.  ...  We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties.  ...  2010 CSD2007-00004 "ARES", and by the European Comission under FP7 project 'Inter-Trust".  ... 
arXiv:1308.2435v1 fatcat:ewcjigomufdedcghbc4ob7pzy4

An access control model for dynamic client-side content

Adam Hess, Kent E. Seamons
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We have implemented the model within TrustBuilder, an architecture for negotiating trust between strangers based on properties other than identity.  ...  The implementation is the first example of content-triggered trust negotiation and currently supports access control for sensitive content disclosed by web and email clients.  ...  The authors would like to thank Marianne Winslett for her helpful discussions on content-triggered trust negotiation and her feedback on earlier versions of this paper.  ... 
doi:10.1145/775439.775440 fatcat:puyiglijlfbgdpmckeqwbubkau
« Previous Showing results 1 — 15 out of 34,344 results