Abstract
We study the structure of nonmonotonic access policies for internet-based resources. We argue that such policies could be divided into two parts: the locally designed policies and imported policies. Imported policies should always be monotonic while the local policies could be nonmonotonic. We develop a safe proof procedure for nonmonotonic trust negotiation where safety means that access to a resource is granted only if its access policy is satisfied.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th IEEE Symposium on Security and Privacy, Oakland, CA (May 1996)
Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254–274. Springer, Heidelberg (1998)
Bonatti, P.A., Samarati, P.: A Uniform Framework for Regulating Service Access and Information Release on the Web. In: Conference on Computer and Communication Security, Athens, Greece (2000)
Dung, P.M.: Negation as hypothesis: an argument-based foundation for logic programming. Journal of Logic Programming (1994)
Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Bowen, K., Kowalski, R.A. (eds.) iclp5th, Washington, Seattle, pp. 1070–1080 (1988)
Herzberg, A., Golan, I., Omer, O., Mass, Y.: An efficient algorithm for establishing trust in strangers, http://www.cs.biu.ac.il/~herzbea/Papers/PKI/ec01-paper.pdf
Hess, A., Smith, B., Jacobson, J., Seamons, K.E., Winslett, M., Yu, L., Yu, T.: Negotiating Trust on the Web. In: IEEE Internet Computing, November 2002, pp. 30–37. IEEE Press, Los Alamitos (2002)
Li, N., Winsborough, W.H.: Towards Practial Automated Trust Negotiation. In: IEEE 3rd Intl. Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Press, Los Alamitos (2002)
Ma, X., Winslett, M., Yu, T.: Prunes: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet. In: Proceeding of Seventh ACM Conference on Computer and Communications Security(CCS-7), pp. 210–219. ACM Press, New York (2000)
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a Role-based Trust-management Framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (May 2002)
Mitchell, J.C., Li, N., Winsborough, W.H.: Distributed Credential Chain Discovery in Trust Management. In: Proceeding of Eighth ACM Conference on Computer and Communications Security(CCS-8), pp. 156–165. ACM Press, New York (2001)
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks (June 2002)
Yu, T., Winslett, M.: An Unified Scheme for Resource Protection in Automated Trust Negotiation. In: IEEE Symposium on Security and Privacy (May 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dung, P.M., Thang, P.M. (2004). Trust Negotiation with Nonmonotonic Access Policies. In: Aagesen, F.A., Anutariya, C., Wuwongse, V. (eds) Intelligence in Communication Systems. INTELLCOMM 2004. Lecture Notes in Computer Science, vol 3283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30179-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-30179-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23893-5
Online ISBN: 978-3-540-30179-0
eBook Packages: Springer Book Archive