Towards trust-aware access management for ad-hoc collaborations

Author(s):  
Jing Jin ◽  
Gail-Joon Ahn ◽  
Mohamed Shehab ◽  
Hongxin Hu
Author(s):  
Indrajit Ray ◽  
Indrakshi Ray ◽  
Sudip Chakraborty

Ad hoc collaborations often necessitate impromptu sharing of sensitive information or resources between member organizations. Each member of resulting collaboration needs to carefully assess and tradeoff the requirements of protecting its own sensitive information against the requirements of sharing some or all of them. The challenge is that no policies have been previously arrived at for such secure sharing (since the collaboration has been formed in an ad hoc manner). Thus, it needs to be done based on an evaluation of the trustworthiness of the recipient of the information or resources. In this chapter, the authors discuss some previously proposed trust models to determine if they can be effectively used to compute trustworthiness for such sharing purposes in ad hoc collaborations. Unfortunately, none of these models appear to be completely satisfactory. Almost all of them fail to satisfy one or more of the following requirements: (i) well defined techniques and procedures to evaluate and/or measure trust relationships, (ii) techniques to compare and compose trust values which are needed in the formation of collaborations, and (iii) techniques to evaluate trust in the face of incomplete information. This prompts the authors to propose a new vector (we use the term “vector” loosely; vector in this work means a tuple) model of trust that is suitable for reasoning about the trustworthiness of systems built from the integration of multiple subsystems, such as ad hoc collaborations. They identify three parameters on which trust depends and formulate how to evaluate trust relationships. The trust relationship between a truster and a trustee is associated with a context and depends on the experience, knowledge, and recommendation that the truster has with respect to the trustee in the given context. The authors show how their model can measure trust in a given context. Sometimes enough information is not available about a given context to calculate the trust value. Towards this end the authors show how the relationships between different contexts can be captured using a context graph. Formalizing the relationships between contexts allows us to extrapolate values from related contexts to approximate a trust value of an entity even when all the information needed to calculate the trust value is not available. Finally, the authors develop formalisms to compare two trust relationships and to compose two or more of the same – features that are invaluable in ad hoc collaborations.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 166083-166094
Author(s):  
Pablo Perez Zarazaga ◽  
Tom Backstrom ◽  
Stephan Sigg

Author(s):  
Laurens Van Hoye ◽  
Tim Wauters ◽  
Filip De Turck ◽  
Bruno Volckaert
Keyword(s):  
Ad Hoc ◽  

Author(s):  
Oliver Page

As a middle-income country, South Africa realizes that it cannot build its way out of every transportation challenge that it faces. Alternative interventions have a role to play in optimizing the efficiency of the present transportation network while ensuring that the benefits from this optimization are distributed equitably. The implementation of the proposed Guidelines on Road Access Management in South Africa is one such intervention that may equitably improve the transportation environment. This paper describes the evolution and status quo of access management in South Africa, assesses the concept and purpose of access management from an equity perspective, considers the efficacy of implementing national access management guidelines while honoring the equity principles contained in the South African constitution and other civil laws and regulations, and assesses a selection of access management techniques with respect to their potential equity impacts. The paper identifies a selection of obstacles that have frustrated the adoption and implementation of access management principles on a national scale. Inconsistency in the implementation of access management principles, which is inevitable when there is no mandated national guideline, compounds the level of inequity manifested by ad hoc highway access permitting and management. Thus, it is concluded that the adoption and implementation of a national access management guideline will measurably enhance the potential of equitably improving the transportation environment in South Africa.


2019 ◽  
Vol 214 ◽  
pp. 09002 ◽  
Author(s):  
Andrea Ceccanti ◽  
Enrico Vianello ◽  
Marco Caberletti ◽  
Francesco Giacomini

X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization on the Grid, but also showed usability issues and required the development of ad-hoc services and libraries to support VO-based authorization schemes in Grid middleware and experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in the HEP R&D roadmap for software and computing, to overcome the usability issues of the current AAI and embrace recent advancement in web technologies widely adopted in industry, but also to enable the secure composition of computing and storage resources provisioned across heterogeneous providers in order to meet the computing needs of HL-LHC. A flexible and usable AAI based on modern web technologies is a key enabler of such secure composition and has been a major topic of research of the recently concluded INDIGO-DataCloud project. In this contribution, we present an integrated solution, based on the INDIGO-DataCloud Identity and Access Management service that demonstrates how a next generation, token-based VO-aware AAI can be built in support of HEP computing use cases, while maintaining compatibility with the existing, VOMS-based AAI used by the Grid.


2012 ◽  
Vol 20 (2-3) ◽  
pp. 223-257
Author(s):  
Gail-Joon Ahn ◽  
Jing Jin ◽  
Mohamed Shehab

Author(s):  
William F Murphy ◽  
Sandra Sanchez Murphy ◽  
Raymond R Buettner ◽  
Grandon Gill

The Joint Interagency Field Experimentation (JIFX) event, organized by the Naval Postgraduate School (NPS), is conducted 3-4 times a year at various locations. The four day event can be characterized as an informing system specifically designed to facilitate structured and unstructured communications between a variety of parties—e.g., software developers, inventors, military and civilian users of various technologies, academics, and agencies responsible for identifying and procuring technology solutions—that frequently are constrained in their informing activities in more restrictive venues. Over the course of the event, participants may observe technology demonstrations, obtain feedback from potential users, acquire new ideas about their technologies might be employed and, perhaps most significantly, engage in ad hoc collaborations with other participants. The present paper describes an exploratory case research study that was conducted over a one year period and involved both direct observation of the event and follow-up interviews with 49 past participants in the event. The goal of the research was to assess the nature of participant-impact resulting from attending JIFX and to consider the consistency of the findings with the predictions of various theoretical frameworks used in informing science. The results suggest that participants perceived that the event provided significant value from three principal sources: discovery, interaction with potential clients (users) of the technologies involved, and networking with other participants. These findings were largely consistent with what could be expected from informing under conditions of high complexity; because value generally derives from combinations of attributes rather than from the sum of individual attributes, we would expect that overall value from informing activities will be perceived even though estimates of the incremental value of that informing cannot be made.


Sign in / Sign up

Export Citation Format

Share Document