Building a Risk-Aware Adaptive Trust Negotiation Framework

Article Preview

Abstract:

In the uncertain environment, trust and risk are both key elements for making trust-based decisions. Risk is regarded as a supplement to trust or even omitted in the most existing trust models, which will lead to one-sided or subjective decisions. To solve the issues, a risk-aware adaptive trust negotiation framework is proposed in this paper. According to the specific negotiation context, the framework analyzes the potential risks and adapts dynamic access control levels appropriately with risk management methods. The use case results indicate that this framework can identify the potential risk and adapt access control polices according to the specific entity and transaction, which avoid risks and provides more efficient trust negotiation services.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 171-172)

Pages:

7-10

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Jøsang and S. Lo Presti, Analyzing the Relationship Between Risk and Trust, In proceedings of the Second International Conference on Trust management (iTrust 2004), volume LNCS 2995, Springer-Verlag (2004), pp.135-145.

DOI: 10.1007/978-3-540-24747-0_11

Google Scholar

[2] A. Jøsang, D. Bradley and S.J. Knapskog. Belief-Based Risk Analysis. in Proc of the 2nd Workshop on Australasian Security, Data Mining and Web Intelligence, and Software Internationalisation(2004).

Google Scholar

[3] T. Dimitrakos. A Service-Oriented Trust Management Framework. Trust, Reputation, and Security: Theories and Practice, LNAI 2631, Springer(2002), pp.53-72.

DOI: 10.1007/3-540-36609-1_6

Google Scholar

[4] Winsborough, W.H., Seamons, K.E., and Jones, V.E. Automated Trust Negotiation. In DARPA Information Survivability Conference and Exposition, SC(2000), pp.88-102.

DOI: 10.1109/discex.2000.824965

Google Scholar

[5] T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons, Adaptive Trust Negotiation and Access Control, SACMAT'05, Stockholm, Sweden(2005), June 1-3.

DOI: 10.1145/1063979.1064004

Google Scholar

[6] Information technology-Security techniques-Guidelines for the management of IT Security (GMITS) Part3: Techniques for the management of IT Security. ISO/IEC TR13335-3(1998).

DOI: 10.3403/30166243

Google Scholar

[7] Seamons, K. et al., Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies(2003), pp.249-253.

DOI: 10.1007/3-540-36467-6_10

Google Scholar