Trusted resource dissemination in Internetware systems

Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource dissemination between Internetware nodes. In this paper, we focus on an evidence-based trustworthiness-assurance mechanism in the approach. An architecture and a protocol that enforces this approach in Internetware systems are also described.

[1]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[2]  Haiyan Zhao,et al.  A software architecture centric engineering approach for Internetware , 2006, Science in China Series F: Information Sciences.

[3]  XianPing Tao,et al.  On environment-driven software model for Internetware , 2008, Science in China Series F: Information Sciences.

[4]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Stephen Crane Privacy Preserving Trust Agents , 2004 .

[6]  Jian Lü,et al.  Technical framework for Internetware: An architecture centric approach , 2008, Science in China Series F: Information Sciences.

[7]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[8]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[9]  Zude Li,et al.  Resource management continuity with constraint inheritance relation , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[10]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[11]  Ravi S. Sandhu,et al.  Towards a multi-dimensional characterization of dissemination control , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[12]  Zude Li,et al.  Towards a dynamic multi-policy dissemination control model: (DMDCON) , 2006, SGMD.

[13]  Ninghui Li,et al.  Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.

[14]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.