Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation

Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each oth...