Dynamic inter-organizational cooperation setup in Circle-of-Trust environments

The need for collaborative service provisioning across different providerspsila domains is being addressed by circles of trust (CoT), whose members adhere to the same policies and expose the same interfaces for collaboration. Todaypsilas CoT specifications require a high initial effort on behalf of enrolling members, thus obviating quick or even ad hoc setup of business cooperation with entities outside a CoT. We explore a procedure that complements the static aspects of the CoT by a dynamic assessment of trust levels between organizations. Its benefit lies in the shortened setup time for a business interaction, which can be achieved by automating the assessment process. The appraisement of a potential partner outside a CoT leverages existing CoT memberspsila experience. We propose algorithms suitable for calculating trust values and discuss alternative solutions to be used where reputation-based assessment within the CoT is impossible.

[1]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[2]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[3]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[4]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[5]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[7]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[8]  Siddharth Bajaj,et al.  Web Services Federation Language (WS- Federation) , 2003 .

[9]  Chris J. Mitchell,et al.  A Taxonomy of Single Sign-On Systems , 2003, ACISP.

[10]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[11]  Latifa Boursas,et al.  Propagating Trust and Privacy Aspects in Federated Identity Management Scenarios , 2008 .

[12]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[13]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[14]  James A. Hendler,et al.  Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.

[15]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[16]  Wolfgang Hommel,et al.  Federated Identity Management: Shortcomings of existing standards , 2005 .

[17]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[18]  Serguei Leontiev,et al.  Using the GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 2006, RFC.