22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester 2004 15/04/2004 Daniel Olmedilla L3S / University.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Semantic Web Policies - A Discussion of Requirements and Research Issues SHIVARAMAN RAGHURAMAN SHIVARAMAN RAGHURAMAN MUKESH SUSILKUMAR MUKESH SUSILKUMAR.
REFEREE: Trust Management for Web Applications Yang-hua Chu (MIT/W3C) Joint Work with Joan Feigenbaum (AT&T Labs) Brian LaMacchia (AT&T Labs) Paul Resnick.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
A Review of Trust Management, Security and Privacy Policy Languages Juri Luca De Coi L3S Research Center & Hannover University A Review of Trust Management,
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Privacy Protection In Grid Computing System Presented by Jiaying Shi.
Will Darby April  What is Federated Security  Example Implementations  Security Assertion Markup Language (SAML) Overview  Alternative.
Using Digital Credentials On The World-Wide Web M. Winslett.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
The Traust Authorization Service A. Lee, M. Winslett, J. Basney, and V. Welch University of Illinois at Urbana-Champaign Goal: A scalable.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
SLIDE 1 Department of Computer Science A flexible access control model for web services Elisa Bertino, Anna Cinzia Squicciarini Lorenzo Martino, Federica.
Integration of Heterogeneous Information Sources into a KRMS for Lifelong Learning E. Demidova, S. Ternier, D. Olmedilla, E. Duval, M. Dicerto, K. Stefanov.
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW (UNCITRAL) Current issues on electronic contracting José Angelo Estrella Faria Legal Officer UNCITRAL.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Decentralized, Agent Based, and Social Approaches to User Modeling (DASUM) Peter Dolog and Julita Vassileva
Social Software for Lifelong Competence Development: Scenario and Challenges Ivana Marenzi, Elena Demidova, Wolfgang Nejdl, Daniel Olmedilla L3S Research.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
MagicNET: Security System for Protection of Mobile Agents.
Scenarios for a Learning GRID Online Educa Nov 30 – Dec 2, 2005, Berlin, Germany Nicola Capuano, Agathe Merceron, PierLuigi Ritrovato
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
PEP Similarity Credential Repository Gossip protocol Access request Credential request Reputation-based Similarity Evaluator AC Policy Request Decision.
The Intranet.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
Next Steps.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17 th Symposium on Security and Privacy, pages IEEE Computer.
Automatic verification of SLA for Firewall Configuration in Grid Environments Gian Luca Volpato – Cracow Grid Workshop 08 – 15 October 2008 Gian Luca Volpato.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
Session 5b, 23 October 2008 eChallenges e-2008 Copyright 2008 Access-eGov Semantic Integration of Government Services - the Access-eGov Approach Peter.
Computer Science and Engineering 1 Mobile Computing and Security.
1/8 Project DIANE: How Social Structure Improves Distributed Reputation Systems Three Hypotheses Universität Karlsruhe.
Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
1 Web Policy Zeitgeist Kent Seamons Internet Security Research Lab Brigham Young University Panel Presentation The Semantic Web and Policy Workshop (SWPW)
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Semantic Web Technologies Readings discussion Research presentations Projects & Papers discussions.
Next Steps.
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
Comparison of LAN, MAN, WAN
NAAS 2.0 Features and Enhancements
الانترنت والبريد الإلكتروني
1st International Conference on Semantics, Knowledge and Grid
Service-Oriented Computing: Semantics, Processes, Agents
Multi-party Authentication in Web Services
Ting Yu and Marianne Winslett Presented by Korporn Panyim
Service-Oriented Computing: Semantics, Processes, Agents
Reactive Policies for the Semantic Web*
Report on the 2008 meeting in Bled
Online Learning.
A Distributed Tabling Algorithm for Rule Based Policy Systems
Protecting Privacy During On-line Trust Negotiation
“The need for Semantic Desktop Dataset” L3S and University of Hannover, Germany Sergey Chernov, Tereza Iofciu, Wolfgang Nejdl, Xuan Zhou (chernov, iofciu,
Policy Language Requirements for Trust Negotiation
Presentation transcript:

22/01/2004Daniel Olmedilla1 INTEGRATING PROLOG IN TRUST NEGOTIATION Software Project / Summer Semester /04/2004 Daniel Olmedilla L3S / University of Hanover Germany

22/01/2004Daniel Olmedilla2 Trust Negotiation Goal  protect resources from unauthorized access New approach to establishing trust between strangers  Initial trust among nodes is not necessary  No need for registration (or even registration automatically) Use of credentials: online analogue to the paper credentials in real life Negotiation according to policies  Access control policies can be used in both sides (requester and provider) Delegation Trust Negotiation  trust is established gradually through an iterative exchange of digital credentials

22/01/2004Daniel Olmedilla3 Scenario Network Diagram

22/01/2004Daniel Olmedilla4 Trust Security Agent

22/01/2004Daniel Olmedilla5 References PeerTrust project page: Gavriloaie, Nejdl, Olmedilla, Seamons, Winslett No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web In proc. of European Semantic Web Symposium, Heraklion 2004 Basney, Nejdl, Olmedilla, Welch, Winslett Negotiating Trust on the Grid In Proc. of 2nd Workshop on Semantics in P2P and Grid Computing at WWW, New York, May 2004 Nejdl, Olmedilla, Winslett PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web