University of Wollongong
Browse

Trust negotiation with trust parameters

Download (252.31 kB)
conference contribution
posted on 2024-11-14, 09:30 authored by Fuchun GuoFuchun Guo, Zhide Chen, Yi Mu
The notion of hidden credentials can be applied to protection of sensitive credentials, resources and policies in trust negotiation. It allows the server to encrypt a resource so that only the client with the correct credentials can decrypt it. The existing scheme of hidden credentials requires that the server grant access to the encrypted resource directly to the client during the negotiation without knowing whether or not the client can decrypt it. It would be a burden if the resources were very large. We found that when the server grants access to services rather than resources, the existing hidden credentials schemes are insecure under our policy attacks, since the server can illegally learn the client's credentials from the attack. In this paper, we propose a scheme to stop the server from mounting a policy attack.

History

Citation

Guo, F., Chen, Z. & Mu, Y. (2006). Trust negotiation with trust parameters. In Y. Cheung, Y. Wang & H. Liu (Eds.), International Conference on Computational Intelligence and Security (pp. 1291-1294). Hong Kong: IEEE.

Parent title

2006 International Conference on Computational Intelligence and Security, ICCIAS 2006

Volume

2

Pagination

1291-1294

Language

English

RIS ID

15752

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC