Title :
A Security Log Based Trust Negotiation Model
Author :
Yuan, Cao ; Li, Yaqin ; Yan, Jun ; Liao, Zhengsong
Author_Institution :
Dept. of Comput. & Inf. Eng., Wuhan Polytech. Univ., Wuhan, China
Abstract :
Trust negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track userspsila deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track userspsila deed by recording all kinds of negotiation states.
Keywords :
authorisation; access control policies; distributed environment; iterative credentials; open environment; resource share; security log based trust negotiation model; system administrator; Access control; Authorization; Computational intelligence; Computer security; Data security; Information security; Iterative methods; Mobile computing; Permission; Resource management; Access Control Policy; Authorization; Digital Credential; Security log; Trust Negotiation;
Conference_Titel :
Computational Intelligence and Natural Computing, 2009. CINC '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3645-3
DOI :
10.1109/CINC.2009.83