Advertisement

The Study of Distributed Entity Negotiation Language in the Computational Grid Environment

  • Honge Ren
  • Yi Shi
  • Jian Zhang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 236)

Abstract

In the distributed computational grid environment, existing trust negotiation languages(TNL for short) could not meet the need of the high efficiency of negotiation, defending the malicious attack and negative expression, therefore we proposed a Distributed Entity Negotiation TNL, which satisfies most of requirements needed in the negotiation language, protects the safety of entities, supports distributed authorization and proof, and negative expression. To improve the efficiency of negotiation, we add it with the feedback policy.

Keywords

trust negotiation distributed authorization and proof release policy feedback policy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conf. and Exposition, pp. 88–102. IEEE Press, New York (2000)Google Scholar
  2. 2.
    Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Paxson, V., Waidner, M. (eds.) Proc.of the IEEE Symp. on Security and Privacy, pp. 81–95. IEEE Press, Washington (2005)Google Scholar
  3. 3.
    Li, N.H., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. In: Herbert, A.S. (ed.) Proc. of the 8th ACM Conf. on Computer and Communications Security, pp. 156–165. ACM Press, New York (2001)Google Scholar
  4. 4.
    Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proc. of the ACM Conf. on Computer and Communications Security, pp. 46–57. ACM Press, New York (2005)Google Scholar
  5. 5.
    Winslett, M., Zhang, C., Bonatti, P.A.: PeerAccess: A logic for distributed authorization. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proc of the ACM Conf. on Computer and Communications Security, pp. 168–179. ACM Press, New York (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Honge Ren
    • 1
  • Yi Shi
    • 1
  • Jian Zhang
    • 1
  1. 1.Information and Computer Engineering CollegeNortheast Forestry UniversityHarbinChina

Personalised recommendations