Abstract
Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one component of a run-time system that can negotiate to establish trust on the Semantic Web. In this paper, we show how to express different kinds of access control policies and control their use at run time using PeerTrust, a new approach to trust establishment. We show how to use distributed logic programs as the basis for PeerTrust’s simple yet expressive policy and trust negotiation language, built upon the rule layer of the Semantic Web layer cake. We describe the PeerTrust language based upon distributed logic programs, and compare it to other approaches to implementing policies and trust negotiation. Through examples, we show how PeerTrust can be used to support delegation, policy protection and negotiation strategies in the ELENA distributed eLearning environment. Finally, we discuss related work and identify areas for further research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Basney, J., Nejdl, W., Olmedilla, D., Welch, V., Winslett, M.: Negotiating trust on the grid. In: 2nd SemPGRID Workshop, New York, USA, May 2004. co-located with WWW (2004)
Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Policies in Distributed Systems and Networks (June 2004)
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium, Heraklion, Greece (May 2004)
Grosof, B.: Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In: Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans, LA, USA (December 2001)
Grosof, B., Poon, T.: SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In: WWW12 (2003)
Hess, A., Seamons, K.E.: An Access Control Model for Dynamic Client Content. In: 8th ACM Symposium on Access Control Models and Technologies, Como, Italy (June 2003)
Horrocks, I., Patel-Schneider, P.: A proposal for an owl rules language (October 2003), http://www.cs.man.ac.uk/horrocks/DAML/Rules/
Jim, T.: SD3: A Trust Management System With Certified Evaluation. In: IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the semantic web. In: International Semantic Web Conference, Sanibel Island (October 2003)
Li, N., Mitchell, J.: RT: A Role-based Trust-management Framework. In: DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C. (April 2003)
Li, N., Mitchell, J., Winsborough, W.: Design of a Role-based Trust-management Framework. In: IEEE Symposium on Security and Privacy, May 2002, Berkeley, California (2002)
Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1) (February 2003)
Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1987)
Nejdl, W., Siberski, W., Sintek, M.: Design issues and challenges for RDF- and schemabased peer-to-peer systems. SIGMOD Record 32(3) (2003)
Nejdl, W., Wolf, B., Qu, C., Decker, S., Sintek, M., Naeve, A., Nilsson, M., Palmér, M., Risch, T.: Edutella: A P2P networking infrastructure based on RDF. In: Proceedings of the 11th International World Wide Web Conference (WWW 2002), Hawaii, USA (June 2002)
Nejdl, W., Wolpers, M., Siberski, W., Schmitz, C., Schlosser, M., Brunkhorst, I., Loser, A.: Super-peer-based routing and clustering strategies for rdf-based peer-to-peer networks. In: Proceedings of the International World Wide Web Conference, Budapest, Hungary (May 2003)
Seamons, K., Winslett, M., Yu, T., Smith, B., Child, E., Jacobsen, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA (June 2002)
Simon, B., MiklĂ³s, Z., Nejdl, W., Sintek, M., Salvachua, J.: Smart space for learning: A mediation infrastructure for learning services. In: Proceedings of the Twelfth International Conference on World Wide Web, Budapest, Hungary (May 2003)
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei and Ponder. In: Proceedings of the International Semantic Web Conference, Sanibel Island (October 2003)
Trevor, J., Suciu, D.: Dynamically distributed query evaluation. In: PODS (2001)
Yu, T., Winslett, M., Seamons, K.: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation. ACM Transactions on Information and System Security 6(1) (February 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nejdl, W., Olmedilla, D., Winslett, M. (2004). PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-30073-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22983-4
Online ISBN: 978-3-540-30073-1
eBook Packages: Springer Book Archive