Mobile Trust Negotiation [chapter]

Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson
2005 IFIP International Federation for Information Processing  
We examine several architectures for extending the nascent technology of automated trust negotiation to bring nonidentity-based authentication and authorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from different security domains (i.e., with no
more » ... sting relationship) to establish trust and perform secure transactions. This proposed system is called surrogate trust negotiation as the sensitive and resource-intense tasks of authentication are performed vicariously for the mobile device by a surrogate trust agent.
doi:10.1007/0-387-24486-7_7 fatcat:aizvv4oho5h4jk4w6ctqq4tuti