408 Hits in 2.8 sec

Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World

L. Alber, S. More, S. Mödersheim, A. Schlichtkrull
2021 Zenodo  
Our contribution is a first step towards integrating SSI and the interaction with a DL into a Trust Policy Language.  ...  We consider the Trust Policy Language TPL of the LIGHTest project [Mö19] that was designed for businesses and organizations to formulate their trust policies.  ...  The trust verification system introduced by the LIGHT est project [BL16] enables this: a high level of assurance, a rich and flexible Trust Policy Language (TPL), and automated policy verification.  ... 
doi:10.5281/zenodo.5243201 fatcat:w67ayt3mdfffxnjhpc65fxyi7e

GTPL: A Graphical Trust Policy Language

Sebastian Alexander Mödersheim, Bihang Ni
2019 Open Identity Summit  
We present GTPL, a Graphical Trust Policy Language, as an easy-to-use interface for the Trust Policy Language TPL proposed by the LIGHTest project.  ...  GTPL closes the gap between languages on a logical-technical level such as TPL that require expertise to use, and interfaces like the LIGHTest Graphical-Layer that allow only for very basic patterns.  ...  In fact, both [He00] and [MS18] call their trust policy language TPL.  ... 
dblp:conf/openidentity/ModersheimN19 fatcat:5txlmhlohvfd7fpmefrhmlrhq4


2008 Proceedings of the International Conference on Security and Cryptography   unpublished
Policies are a well-known approach to protecting security and privacy of users as well as for flexible trust management in distributed environments.  ...  In the last years a number of policy languages were proposed to address different application scenarios.  ...  Some years before IBM had already introduced the pioneer role-based policy language TPL (Trust Policy Language), which paved the way to other role-based policy languages like Cassandra and RT (Role-based  ... 
doi:10.5220/0001921004830490 fatcat:yomyj3dg4rdfdjozlb566rn4hu

Accountable Trust Decisions: A Semantic Approach

Anders Schlichtkrull, Sebastian Mödersheim
2020 Open Identity Summit  
We have implemented this for the Trust Policy Language of the LIGHTest project and we use the completely independently developed FOL theorem prover RP_X as a complementary method.  ...  , we want to be sure that this did not happen because of a bug in a policy checker.  ...  management in support of an open Ecosystem of Trust schemes" ( and by the "CyberSec4Europe" European Union's Horizon 2020 research and innovation programme under grant agreement No 830929.  ... 
doi:10.18420/ois2020_06 dblp:conf/openidentity/SchlichtkrullM20 fatcat:3plokkqb7zakjjqsjkmenk5uta

Policy Languages and Their Suitability for Trust Negotiation [chapter]

Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
2018 Lecture Notes in Computer Science  
This paper aims to identify the most suitable policy language for trust negotiation. To do so, policy languages are analysed against a set of criteria for trust negotiation that are first established.  ...  Entities specify their own policies that handle a disclosure of confidential information to maintain their security and privacy. Policies are defined by means of a policy language.  ...  It is supported by a few languages, such as X-TNL, SecPAL4P, PSPL, TPL and X-Sec.  ... 
doi:10.1007/978-3-319-95729-6_5 fatcat:a7eohzvz4javreow2o4plravda

Trust negotiations: concepts, systems, and languages

E. Bertino, E. Ferrari, A. Squicciarini
2004 Computing in science & engineering (Print)  
The authors provide a model for trust negotiation systems and delineate the features of ideal trust negotiation systems.  ...  Trust negotiation is a promising approach for establishing trust in open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other.  ...  A key element of the system is a Trust Policy Language (TPL), 11 specified using XML. 12 A distinctive feature of the system is that it extends traditional role-based access control systems by validating  ... 
doi:10.1109/mcse.2004.22 fatcat:gudbiya3ingtnlresqbhxtevaq

Rule-Based Policy Representations and Reasoning [chapter]

Piero Andrea Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro
2009 Lecture Notes in Computer Science  
Trust and policies are going to play a crucial role in enabling the potential of many web applications.  ...  Policies are a well-known approach to protecting security and privacy of users in the context of the Semantic Web: in the last years a number of policy languages were proposed to address different application  ...  Some years before IBM had already introduced the pioneer role-based policy language TPL (Trust Policy Language), which paved the way to other role-assignment policy languages like Cassandra and RT (Role-based  ... 
doi:10.1007/978-3-642-04581-3_4 fatcat:jfydzx7ysffi7fvguxxv4queze

Responding to policies at runtime in TrustBuilder

B. Smith, K.E. Seamons, M.D. Jones
2004 Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.  
When a policy is received at runtime, a compliance checker determines which credentials satisfy the policy so they can be disclosed.  ...  One approach to negotiating trust is for the participants to exchange access control policies to inform each other of the requirements for establishing trust.  ...  The following illustrates how TrustBuilder adopts this approach using the XML-based Trust Policy Language (TPL) supported by the IBM TE system [9] .  ... 
doi:10.1109/policy.2004.1309161 dblp:conf/policy/SmithSJ04 fatcat:7ug3bfuv6neeheyvqjspyszn4a

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework [chapter]

Ragib Hasan, Marianne Winslett
2006 Lecture Notes in Computer Science  
In this paper, we present Synergy, a general purpose information sharing framework that uses trust negotiation to implement scalable authorization in an open environment.  ...  Also, many information sources have dynamic access control policies, which are hard to satisfy under existing schemes.  ...  We used TrustBuilder as the trust agent. For specification of access policies, we use the IBM Trust Policy Language (TPL) [9] which is currently supported by TrustBuilder [17] .  ... 
doi:10.1007/11760146_50 fatcat:lkoorg4oqjg6hakonywpm7dbvu

Teacher professional learning: a holistic and cultural endeavour imbued with transformative possibility

Geraldine Mooney Simmie
2021 Educational review (Birmingham)  
I then use this lens to conduct a critical scrutiny of a select literature, a mainstream framing of TPL using best-evidence syntheses, reports from one transnational policy influencer, the Organization  ...  In this article, I conduct a critical scrutiny of how best to frame Teacher Professional Learning (TPL) in a time of uncertainty, to what extent, contemporary mainstream literature provides a complete  ...  TPL was instead situated within a view of human capital, concerned with releasing social and cultural capital (e.g. trust, respect, instructional leadership, distributed leadership, transformative leadership  ... 
doi:10.1080/00131911.2021.1978398 fatcat:rqnypfvwovfjfklca33x5ad7uu

A trust negotiation system for digital library Web services

Halvard Skogsrud, Boualem Benatallah, Fabio Casati
2004 International Journal on Digital Libraries  
In particular, we present a set of policy change operations that enable the dynamic evolution of negotiation policies without disrupting ongoing negotiations.  ...  In this paper we introduce Trust-Serv, a model-driven trust negotiation framework for Web services, and show how it can be used to effectively handle trust negotiation in DLs.  ...  In the implementation, we use the policy language TPL (Trust Policy Language) [22] to specify credential disclosure conditions. In TPL, conditions consist of a set of rules, or RULE elements.  ... 
doi:10.1007/s00799-004-0083-y fatcat:dfqj4ptu2rfgrn5sumsckwfyha

The regularity principle of self-management

Naftaly H. Minsky
2010 Proceeding of the second international workshop on Self-organizing architectures - SOAR '10  
In other words, this principle identifies the ability to establish regularities in a system, as a necessary condition for its selfmanageability.  ...  This paper also proposes a mechanism for establishing a wide range of regularities, even over heterogeneous distributed systems-which would otherwise lack them.  ...  network layer-can usually be trusted to implement the required policies, making such devises into autonomic components.  ... 
doi:10.1145/1809036.1809040 fatcat:igyvwi4iprfcjdgocot4ekib2i

Formal Validation of OFEPSP+ with AVISPA [chapter]

Jorge L. Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Benjamin Ramos
2009 Lecture Notes in Computer Science  
OFEPSP+ ensures that no party gains an unfair advantage over the other during the protocol execution, while substantially reducing the probability of a successful attack on the protocol due to a compromise  ...  In particular, the results obtained from the formal validation of the improved Optimistic Fair Exchange Protocol based on Signature Policies (OFEPSP+) are presented.  ...  We found that the usage of signature policies could not be modeled in HLPSL. HLPSL allows translating an Alice & Bob chart into a more detailed and expressive language.  ... 
doi:10.1007/978-3-642-03459-6_9 fatcat:tw6sdm6opnclzpubqftxiyqply

The Toronto Public Library as a Site of Urban Care, Social Repair, and Maintenance in the Smart City [chapter]

Teresa Abbruzzese, Antony Riley
2021 Care and the City  
policies be assigned to the TPL (Ruttan et al. 2019) .  ...  In 2019, the TPL became a potential key player in Sidewalk Toronto's plans with the TRBOT's recommendation to make the TPL a civic data trust for the Quayside development.  ... 
doi:10.4324/9781003031536-22 fatcat:srqdovxjcvgvbj7kw662qggfgq

Towards usefully secure email

Chris Masone, Sean Smith
2007 IEEE technology & society magazine  
trust relationships with each other, and then to use this PKI to manage their trust in people with whom they correspond via secure email.  ...  To demonstrate this principle, we are building Attribute-Based, Usefully Secure Email (ABUSE), a system that leverages users by enabling them to build a decentralized, non-hierarchical PKI to express their  ...  To use these systems, a user would have to specify his trust policy in one of these logical programming languages. TPL is an XML-based TM language that can be reduced to Prolog.  ... 
doi:10.1109/mtas.2007.335563 fatcat:r5erfdulbrcolimhfuhbpjnyey
« Previous Showing results 1 — 15 out of 408 results