IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identification and Adaptive Trust Negotiation in Interconnected Systems

Identification and Adaptive Trust Negotiation in Interconnected Systems
View Sample PDF
Author(s): Eugene Sanzi (University of Connecticut, USA)and Steven A. Demurjian (University of Connecticut, USA)
Copyright: 2016
Pages: 33
Source title: Innovative Solutions for Access Control Management
Source Author(s)/Editor(s): Ahmad Kamran Malik (COMSATS Institute of Information Technology, Pakistan), Adeel Anjum (COMSATS Institute of Information Technology, Pakistan)and Basit Raza (COMSATS Institute of Information Technology, Pakistan)
DOI: 10.4018/978-1-5225-0448-1.ch002

Purchase

View Identification and Adaptive Trust Negotiation in Interconnected Systems on the publisher's website for pricing and purchasing information.

Abstract

Creating an online identity via a username/password does not provide the ability to establish trust with other systems in order to get access to unauthorized information in a time-critical situation. Trust is the ability of two entities to believe one another at some level, so that they can interact in a secure manner, e.g., a physician at one hospital may need to obtain medical data on a patient from another hospital to treat a patient, facilitated if there is a trusted relationship. This chapter explores adaptive trust negotiation that obtains near real-time permission to access a system to which a user has never previously been authorized to, so that the system receiving the request can adjust its security policies depending on the attributes that the requester possesses. To accomplish this, a set of interacting systems (e.g., from different hospitals) can be augmented with identity management and adaptive trust negotiation to create a means where multiple disparate systems can make informed and dynamic security decisions about users relative to their defined security policies.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom