TY - GEN
T1 - Identity-based long running negotiations
AU - Squicciarini, Anna C.
AU - Trombetta, Alberto
AU - Bertino, Elisa
AU - Braghin, Stefano
PY - 2008
Y1 - 2008
N2 - Identity based negotiations are convenient protocols to closely control users' personal data, that empower users to negotiate the trust of unknown counterparts by carefully governing the disclosure of their identities. Such type of negotiations presents, however, unique challenges, mainly caused by the way identity attributes are distributed and managed. In this paper we present novel approach for conducting long running negotiations in the context of digital identity management systems. We propose some major extensions to an existing trust negotiation protocol to support negotiations that are conducted during multiple sessions. To the best of our knowledge, this is the first time a protocol for conducting trust negotiations over multiple sessions is presented.
AB - Identity based negotiations are convenient protocols to closely control users' personal data, that empower users to negotiate the trust of unknown counterparts by carefully governing the disclosure of their identities. Such type of negotiations presents, however, unique challenges, mainly caused by the way identity attributes are distributed and managed. In this paper we present novel approach for conducting long running negotiations in the context of digital identity management systems. We propose some major extensions to an existing trust negotiation protocol to support negotiations that are conducted during multiple sessions. To the best of our knowledge, this is the first time a protocol for conducting trust negotiations over multiple sessions is presented.
UR - http://www.scopus.com/inward/record.url?scp=70349249348&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349249348&partnerID=8YFLogxK
U2 - 10.1145/1456424.1456440
DO - 10.1145/1456424.1456440
M3 - Conference contribution
AN - SCOPUS:70349249348
SN - 9781605582948
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 97
EP - 105
BT - Proceedings of the 4th ACM Workshop on Digital Identity Management, DIM'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
T2 - 4th ACM Workshop on Digital Identity Management, DIM'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Y2 - 27 October 2008 through 31 October 2008
ER -