School of Computing

Privacy Preserving Trust Authorization Framewrok using XACML

U.M. Mbanaso, G.S. Cooper, D.W. Chadwick, and S. Proctor

In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), pages 182-196. IEEE Computer Society, June 2006 Presented in Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC'06).

Abstract

Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the parties have no pre-existing relationships. Trust Negotiation is the process used to establish these first relationships, through the transfer of attributes, embedded in digital credentials, between the two parties. However, these attributes may themselves be considered sensitive and so may need protection from disclosure. In some environments, the policies that govern the protected services may also be considered sensitive and their release to arbitrary strangers may leak confidential business information. Thus, the electronic services, the policies that control access to them, and the digital credentials used to gain access may all be sensitive and require access protections. This paper describes how to unify the protection of services, sensitive credentials and policies in a synchronised trustworthy manner. We propose a trust authorization framework (TAF) that builds on the capabilities of XACML to support the bilateral exchange of policies and credentials through trust negotiation. Our framework addresses privacy and trust issues, and considers services, credentials, and authorization policies protected resources whose access is subject to credential proof and trust level validation

Download publication 145 kbytes (PDF)

Bibtex Record

@inproceedings{2414,
author = {Mbanaso, U.M. and Cooper, G.S. and Chadwick, D.W. and Proctor, S.},
title = {{P}rivacy {P}reserving {T}rust {A}uthorization {F}ramewrok using {XACML}},
month = {June},
year = {2006},
pages = {182-196},
keywords = {determinacy analysis, Craig interpolants},
note = {Presented in Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC'06)
},
doi = {},
url = {http://www.cs.kent.ac.uk/pubs/2006/2414},
    publication_type = {inproceedings},
    submission_id = {9799_1155645403},
    ISBN = {0-7695-2593-8},
    booktitle = {IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006)},
    publisher = {IEEE Computer Society },
}

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 21/03/2014