Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation

Kent E. Seamons, Marianne Winslett, Ting Yu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

135 Citations (Scopus)

Abstract

Automated trust negotiation is a new approach to establishing trust between strangers through the exchange of property-based digital credentials, and the use of mobile access control policies that specify what combinations of credentials a stranger must supply in order to gain access to each local service or credential. In this paper, we show that access control policies can also contain sensitive information that should be protected from inappropriate access by strangers during negotiation. We present and analyze two automated trust negotiation strategies that support protection for access control policies. The first is the relevant credentials set strategy, which does not directly disclose access control policies and has a fast running time, but may disclose more credentials than strictly necessary. The second strategy is the all relevant policies strategy, which freely discloses all relevant access control policies that the other negotiating party has earned access to during negotiation, and offers the possibility of disclosing fewer credentials during negotiation.

Original languageEnglish
Title of host publicationProceedings of the Symposium on Network and Distributed System Security, NDSS 2001
PublisherThe Internet Society
ISBN (Electronic)189156210X, 9781891562105
Publication statusPublished - 2001
Externally publishedYes
Event8th Symposium on Network and Distributed System Security, NDSS 2001 - San Diego, United States
Duration: 8 Feb 20019 Feb 2001

Publication series

NameProceedings of the Symposium on Network and Distributed System Security, NDSS 2001

Conference

Conference8th Symposium on Network and Distributed System Security, NDSS 2001
Country/TerritoryUnited States
CitySan Diego
Period8/02/019/02/01

Fingerprint

Dive into the research topics of 'Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation'. Together they form a unique fingerprint.

Cite this