Traust: A trust negotiation-based authorization service for open systems

Adam J. Lee, Amarianne Winslett, Jim Basney, Welch Von

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown that TN is indeed a viable solution for these environments by developing a number of policy languages and strategies for TN which have desirable theoretical properties. Further, existing protocols, such as TLS, have been altered to interact with prototype TN systems, thereby illustrating the utility of TN. Unfortunately, modifying existing protocols is often a time-consuming and bureaucratic process which can hinder the adoption of this promising technology. In this paper, we present Traust, a third-party authorization service that leverages the strengths of existing prototype TN systems. Traust acts as an authorization broker that issues access tokens for resources in an open system after entities use TN to satisfy the appropriate resource access policies. The Traust architecture was designed to allow Traust to be integrated either directly with newer trust-aware applications or indirectly with existing legacy applications; this flexibility paves the way for the incremental adoption of TN technologies without requiring widespread software or protocol upgrades. We discuss the design and implementation of Traust, the communication protocol used by the Traust system, and its performance. We also discuss our experiences using Traust to broker access to legacy resources, our proposal for a Traust-aware version of the GridFTP protocol, and Traust's resilience to attack.

Original languageEnglish (US)
Title of host publicationSACMAT 2006
Subtitle of host publicationProceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
Pages39-48
Number of pages10
StatePublished - Sep 4 2006
Event11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006 - Lake Tahoe, CA, United States
Duration: Jun 7 2006Jun 9 2006

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
Volume2006

Other

Other11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006
CountryUnited States
CityLake Tahoe, CA
Period6/7/066/9/06

Keywords

  • Attribute-based access control
  • Credentials
  • Trust negotiation

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Traust: A trust negotiation-based authorization service for open systems'. Together they form a unique fingerprint.

  • Cite this

    Lee, A. J., Winslett, A., Basney, J., & Von, W. (2006). Traust: A trust negotiation-based authorization service for open systems. In SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (pp. 39-48). (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; Vol. 2006).