This paper outlines a conceptual architecture for an autonomic middleware component designed to provide application-independent access control for use in largescale highly-dynamic computing environments. In such environments, most notably ambient/pervasive computing environments, centralised access control policy determination is impossible or inadvisable because of the complexity of trust relationships. In the absence of centralisation, network resources are forced to make trusting decisions locally, in the light of information that they themselves can gather. Thus the architecture that is described in this paper is founded around an automatic knowledge acquisition and processing mechanism, acting as the foundations of a semi-autonomous multi-agent system (MAS). The agents dynamically organise themselves into cooperating distributed communities that mediate between users and devices (collectively known as trustees) and network resources (principals). Once activated by their owners, agents maintain user credentials, negotiate amongst themselves to establish the credibility of prospective trustees identities and cooperate to gather evidence about the likelihood of trustees adhering to the policies of principals.
[1]
E. Friedman,et al.
The Social Cost of Cheap Pseudonyms
,
2001
.
[2]
Jian Tang,et al.
Distributed PIN Verification Scheme for Improving Security of Mobile Devices
,
2003,
Mob. Networks Appl..
[3]
Stephen Weeks,et al.
Understanding trust management systems
,
2001,
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[4]
Paddy Nixon,et al.
Trusting Collaboration in Global Computing Systems
,
2003,
iTrust.
[5]
Lik Mui,et al.
Computational models of trust and reputation: agents, evolutionary games, and social networks
,
2002
.
[6]
Tyrone W. Grandison.
Trust Specification and Analysis for Internet Applications
,
2001
.
[7]
Adam Rifkin,et al.
Trust Management on the World Wide Web
,
1998,
Comput. Networks.