Skip to main content

PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web

  • Conference paper
Secure Data Management (SDM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3178))

Included in the following conference series:

Abstract

Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one component of a run-time system that can negotiate to establish trust on the Semantic Web. In this paper, we show how to express different kinds of access control policies and control their use at run time using PeerTrust, a new approach to trust establishment. We show how to use distributed logic programs as the basis for PeerTrust’s simple yet expressive policy and trust negotiation language, built upon the rule layer of the Semantic Web layer cake. We describe the PeerTrust language based upon distributed logic programs, and compare it to other approaches to implementing policies and trust negotiation. Through examples, we show how PeerTrust can be used to support delegation, policy protection and negotiation strategies in the ELENA distributed eLearning environment. Finally, we discuss related work and identify areas for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Basney, J., Nejdl, W., Olmedilla, D., Welch, V., Winslett, M.: Negotiating trust on the grid. In: 2nd SemPGRID Workshop, New York, USA, May 2004. co-located with WWW (2004)

    Google Scholar 

  2. Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Policies in Distributed Systems and Networks (June 2004)

    Google Scholar 

  3. Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium, Heraklion, Greece (May 2004)

    Google Scholar 

  4. Grosof, B.: Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In: Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans, LA, USA (December 2001)

    Google Scholar 

  5. Grosof, B., Poon, T.: SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In: WWW12 (2003)

    Google Scholar 

  6. Hess, A., Seamons, K.E.: An Access Control Model for Dynamic Client Content. In: 8th ACM Symposium on Access Control Models and Technologies, Como, Italy (June 2003)

    Google Scholar 

  7. Horrocks, I., Patel-Schneider, P.: A proposal for an owl rules language (October 2003), http://www.cs.man.ac.uk/horrocks/DAML/Rules/

  8. Jim, T.: SD3: A Trust Management System With Certified Evaluation. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)

    Google Scholar 

  9. Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: International Semantic Web Conference, Sanibel Island (October 2003)

    Google Scholar 

  10. Li, N., Mitchell, J.: RT: A Role-based Trust-management Framework. In: DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C. (April 2003)

    Google Scholar 

  11. Li, N., Mitchell, J., Winsborough, W.: Design of a Role-based Trust-management Framework. In: IEEE Symposium on Security and Privacy, May 2002, Berkeley, California (2002)

    Google Scholar 

  12. Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1) (February 2003)

    Google Scholar 

  13. Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1987)

    MATH  Google Scholar 

  14. Nejdl, W., Siberski, W., Sintek, M.: Design issues and challenges for RDF- and schemabased peer-to-peer systems. SIGMOD Record 32(3) (2003)

    Google Scholar 

  15. Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmér, M., Risch, T.: Edutella: A P2P networking infrastructure based on RDF. In: Proceedings of the 11th International World Wide Web Conference (WWW 2002), Hawaii, USA (June 2002)

    Google Scholar 

  16. Nejdl, W., Wolpers, M., Siberski, W., Schmitz, C., Schlosser, M., Brunkhorst, I., Loser, A.: Super-peer-based routing and clustering strategies for rdf-based peer-to-peer networks. In: Proceedings of the International World Wide Web Conference, Budapest, Hungary (May 2003)

    Google Scholar 

  17. Seamons, K., Winslett, M., Yu, T., Smith, B., Child, E., Jacobsen, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA (June 2002)

    Google Scholar 

  18. Simon, B., MiklĂ³s, Z., Nejdl, W., Sintek, M., Salvachua, J.: Smart space for learning: A mediation infrastructure for learning services. In: Proceedings of the Twelfth International Conference on World Wide Web, Budapest, Hungary (May 2003)

    Google Scholar 

  19. Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei and Ponder. In: Proceedings of the International Semantic Web Conference, Sanibel Island (October 2003)

    Google Scholar 

  20. Trevor, J., Suciu, D.: Dynamically distributed query evaluation. In: PODS (2001)

    Google Scholar 

  21. Yu, T., Winslett, M., Seamons, K.: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation. ACM Transactions on Information and System Security 6(1) (February 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nejdl, W., Olmedilla, D., Winslett, M. (2004). PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30073-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22983-4

  • Online ISBN: 978-3-540-30073-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics