Entry Lee:2008:TAS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Lee:2008:TAS,
  author =       "Adam J. Lee and Marianne Winslett and Jim Basney and
                 Von Welch",
  title =        "The {Traust Authorization Service}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1330295.1330297",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:35 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "In recent years, trust negotiation has been proposed
                 as a novel authorization solution for use in
                 open-system environments, in which resources are shared
                 across organizational boundaries. Researchers have
                 shown that trust negotiation is indeed a viable
                 solution for these environments by developing a number
                 of policy languages and strategies for trust
                 negotiation that have desirable theoretical properties.
                 Further, existing protocols, such as TLS, have been
                 altered to interact with prototype trust negotiation
                 systems, thereby illustrating the utility of trust
                 negotiation. Unfortunately, modifying existing
                 protocols is often a time-consuming and bureaucratic
                 process that can hinder the adoption of this promising
                 technology. \par

                 In this paper, we present Traust, a third-party
                 authorization service that leverages the strengths of
                 existing prototype trust negotiation systems. Traust
                 acts as an authorization broker that issues access
                 tokens for resources in an open system after entities
                 use trust negotiation to satisfy the appropriate
                 resource access policies. The Traust architecture was
                 designed to allow Traust to be integrated either
                 directly with newer trust-aware applications or
                 indirectly with existing legacy applications; this
                 flexibility paves the way for the incremental adoption
                 of trust negotiation technologies without requiring
                 widespread software or protocol upgrades. We discuss
                 the design and implementation of Traust, the
                 communication protocol used by the Traust system, and
                 its performance. We also discuss our experiences using
                 Traust to broker access to legacy resources, our
                 proposal for a Traust-aware version of the GridFTP
                 protocol, and Traust's resilience to attack.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "attribute-based access control; credentials; trust
                 negotiation",
}

Related entries