TY - GEN
T1 - Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation
AU - Seamons, Kent E.
AU - Winslett, Marianne
AU - Yu, Ting
N1 - Publisher Copyright:
© 2001 Symposium on Network and Distributed System Security
PY - 2001
Y1 - 2001
N2 - Automated trust negotiation is a new approach to establishing trust between strangers through the exchange of property-based digital credentials, and the use of mobile access control policies that specify what combinations of credentials a stranger must supply in order to gain access to each local service or credential. In this paper, we show that access control policies can also contain sensitive information that should be protected from inappropriate access by strangers during negotiation. We present and analyze two automated trust negotiation strategies that support protection for access control policies. The first is the relevant credentials set strategy, which does not directly disclose access control policies and has a fast running time, but may disclose more credentials than strictly necessary. The second strategy is the all relevant policies strategy, which freely discloses all relevant access control policies that the other negotiating party has earned access to during negotiation, and offers the possibility of disclosing fewer credentials during negotiation.
AB - Automated trust negotiation is a new approach to establishing trust between strangers through the exchange of property-based digital credentials, and the use of mobile access control policies that specify what combinations of credentials a stranger must supply in order to gain access to each local service or credential. In this paper, we show that access control policies can also contain sensitive information that should be protected from inappropriate access by strangers during negotiation. We present and analyze two automated trust negotiation strategies that support protection for access control policies. The first is the relevant credentials set strategy, which does not directly disclose access control policies and has a fast running time, but may disclose more credentials than strictly necessary. The second strategy is the all relevant policies strategy, which freely discloses all relevant access control policies that the other negotiating party has earned access to during negotiation, and offers the possibility of disclosing fewer credentials during negotiation.
UR - http://www.scopus.com/inward/record.url?scp=85056545124&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85056545124
T3 - Proceedings of the Symposium on Network and Distributed System Security, NDSS 2001
BT - Proceedings of the Symposium on Network and Distributed System Security, NDSS 2001
PB - The Internet Society
T2 - 8th Symposium on Network and Distributed System Security, NDSS 2001
Y2 - 8 February 2001 through 9 February 2001
ER -