2010
DOI: 10.1109/tkde.2010.83
|View full text |Cite
|
Sign up to set email alerts
|

A Rule-Based Trust Negotiation System

Abstract: Open distributed environments, such as the World Wide Web, facilitate information sharing but provide limited support to the protection of sensitive information and resources. Trust negotiation (TN) frameworks have been proposed as a better solution for open environments, in which parties may get in touch and interact without being previously known to each other. In this paper, we illustrate PROTUNE, a rule-based TN system. By describing PROTUNE, we will illustrate the advantages that arise from an advanced ru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 28 publications
0
25
0
Order By: Relevance
“…Experimental result such as those reported by Bonatti et al (2010) show that there are no immediate issues related to performance when using these policies. Indeed, currently, real-world policies are not very large, partly because trust negotiation systems are not yet widely deployed; therefore, the application of articulated policies would place an excessive burden on users.…”
Section: Scalabilitymentioning
confidence: 78%
See 1 more Smart Citation
“…Experimental result such as those reported by Bonatti et al (2010) show that there are no immediate issues related to performance when using these policies. Indeed, currently, real-world policies are not very large, partly because trust negotiation systems are not yet widely deployed; therefore, the application of articulated policies would place an excessive burden on users.…”
Section: Scalabilitymentioning
confidence: 78%
“…Remarkably, in some trust negotiation systems like Protune (see Bonatti & Olmedilla, 2005;Bonatti et al, 2010) agents exchange their requirements by disclosing selected parts of their policies in the form of logic programming rules. transactions) in direct as well as indirect ways (like reputation systems do, for example).…”
Section: Semantics For Trustmentioning
confidence: 99%
“…Using ConSpec for our work is motivated by 3 reasons: (1) ConSpec was designed for specifying security properties; (2) it also supports the monitoring of security properties at runtime (eg, see Asim et al); and (3) by using a language that is independent from the underlying service technologies, we can support different service technologies (eg, RESTful services, WSDL‐compliant services) at the same time. Our work can easily be adapted to other service specification languages that support security properties such as Unified Services Description Language, PROTUNE, or combinations of XACML and WSDL…”
Section: Modelling Secure Servicesmentioning
confidence: 99%
“…Another semantic policy language is Protune [22]. It is based on logic programming rules, including negation.…”
Section: Related Workmentioning
confidence: 99%