automated trust negotiation
Recently Published Documents


TOTAL DOCUMENTS

77
(FIVE YEARS 0)

H-INDEX

11
(FIVE YEARS 0)

Author(s):  
Michele Tomaiuolo

The availability and adoption of open protocols allow applications to integrate Web services offered by different providers. Moreover, simple services can be dynamically composed to accomplish more complex tasks. This implies the delegation of both tasks and permissions. In fact, delegation is intertwined with some notion of risk, on the one hand, and trust, on the other hand. Well founded socio-cognitive models of trust may orient managers and system administrators to delegate tasks and goals to the most trusted entities, after conscious evaluation of risks and gains associated with the decision. This chapter presents different mechanisms and models that have been proposed for establishing secure delegations in open environments. They include Role-Based Access Control, Trust Management, and Federated Identity. Complex frameworks and live systems have been realized according to these models. However, their administration remain a challenging task. Ongoing research works in various fields, such as Automated Trust Negotiation, promise to simplify the practical realization and configuration of delegation-based systems.


Author(s):  
Michele Tomaiuolo

The availability and adoption of open protocols allow applications to integrate Web services offered by different providers. Moreover, simple services can be dynamically composed to accomplish more complex tasks. This implies the delegation of both tasks and permissions. In fact, delegation is intertwined with some notion of risk, on the one hand, and trust, on the other hand. Well founded socio-cognitive models of trust may orient managers and system administrators to delegate tasks and goals to the most trusted entities, after conscious evaluation of risks and gains associated with the decision. This chapter presents different mechanisms and models that have been proposed for establishing secure delegations in open environments. They include Role-Based Access Control, Trust Management, and Federated Identity. Complex frameworks and live systems have been realized according to these models. However, their administration remain a challenging task. Ongoing research works in various fields, such as Automated Trust Negotiation, promise to simplify the practical realization and configuration of delegation-based systems.


2013 ◽  
Vol 36 (1) ◽  
pp. 219-230 ◽  
Author(s):  
Xinxin Liu ◽  
Shaohua Tang ◽  
Qiong Huang ◽  
Zhiwen Yu

2013 ◽  
Vol 8 (10) ◽  
Author(s):  
Hongwei Chen ◽  
Shuping Wang ◽  
Hui Xu ◽  
Zhiwei Ye ◽  
Chunzhi Wang

2013 ◽  
Vol 32 (3) ◽  
pp. 686-689
Author(s):  
Kai WANG ◽  
Hong-qi ZHANG ◽  
Zhi-yu REN

Sign in / Sign up

Export Citation Format

Share Document