NOMS 2008 - 2008 IEEE Network Operations and Management Symposium 2008
DOI: 10.1109/noms.2008.4575124
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic inter-organizational cooperation setup in Circle-of-Trust environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…These approaches are mainly focused on flexible access control but do not deal with the establishment of dynamic trust relationships between providers. In this sense, the proposals that are closest to the ideas presented in this paper are [18,19] and [17]. However, thought they introduce reputation in FIM, they all require some form of centralized storage; so the move to a completely distributed model is the main novelty of our approach.…”
Section: Outcomes Under "Nice" Conditionsmentioning
confidence: 95%
See 1 more Smart Citation
“…These approaches are mainly focused on flexible access control but do not deal with the establishment of dynamic trust relationships between providers. In this sense, the proposals that are closest to the ideas presented in this paper are [18,19] and [17]. However, thought they introduce reputation in FIM, they all require some form of centralized storage; so the move to a completely distributed model is the main novelty of our approach.…”
Section: Outcomes Under "Nice" Conditionsmentioning
confidence: 95%
“…However, the application of this dimension of trust to IdM has not been fully addressed yet, and here we aim to evaluate its usefulness to build a reputation-based federated model. Thought there are related proposals [18,19] and previous work [17], this is the first approach that introduces reputation in FIM without requiring any form of centralized storage.…”
Section: Motivationmentioning
confidence: 99%
“…Considerable research on Circle-of-Trust has been devoted to identity federation such as [10] where trust requirements and patterns in a Circle-of-Trust identity federation are identified. In [3], Circle-of-Trust collaboration trust considerations in identity federation for assessment of entities' trust outside the circle are considered. Our work is focussed on authorization federation in a collaboration group of entities considered as tenants.…”
Section: Related Workmentioning
confidence: 99%
“…Telecom operators rely on a Circle of Trust model to allow CS interoperability. Joining the Circle of Trust ensures an implicit initial level of trust [1] to its members. On the contrary, Web CSs are usually organized in a silo model: to communicate together, two users must be using the same CS.…”
Section: Introductionmentioning
confidence: 99%