A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Mobile Trust Negotiation
[chapter]
2005
IFIP International Federation for Information Processing
We examine several architectures for extending the nascent technology of automated trust negotiation to bring nonidentity-based authentication and authorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from different security domains (i.e., with no
doi:10.1007/0-387-24486-7_7
fatcat:aizvv4oho5h4jk4w6ctqq4tuti