On access control policy assignments and negotiation strategies in automated trust negotiation Online publication date: Thu, 30-Apr-2015
by Po-Jen Chuang; Ming-Yu Ni
International Journal of Security and Networks (IJSN), Vol. 9, No. 2, 2014
Abstract: Trust management can be used to deal with a number of security issues in virtual networks. In internet communications, efficient secure trust negotiation between virtual individuals/organisations is very important as it can achieve resource sharing, collaborative computing and communication security. This investigation aims to strengthen the efficiency and security of trust negotiation by using: 1) a more advanced negotiation strategy to facilitate negotiation; 2) more precise principles to attain better access control policy assignments; 3) iterative computation and a cache mechanism to further enhance negotiation efficiency. Experimental evaluation is conducted to compare the performance of our strategy and related strategies under several performance measures of interest. The result shows that our new strategy outperforms other strategies in most situations as it obtains a well-balanced trade-off between the efficiency and security of trust negotiation.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com