This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Dynamic Trust Management
February 2009 (vol. 42 no. 2)
pp. 44-52
Matt Blaze, University of Pennsylvania
Sampath Kannan, University of Pennsylvania
Insup Lee, University of Pennsylvania
Oleg Sokolsky, University of Pennsylvania
Jonathan M. Smith, University of Pennsylvania
Angelos D. Keromytis, Columbia University
Wenke Lee, Georgia Institute of Technology
Trust management forms the basis for communicating policy among system elements and demands credential checking for access to all virtual private service resources—along with careful evaluation of credentials against specified policies—before a party can be trusted.

1. M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. 17th Symp. Security and Privacy, IEEE CS Press, 1996, pp. 164-173.
2. M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust-Management System," Proc. Financial Cryptography 98, LNCS 1465, Springer, 1998, pp. 254-274.
3. S. Ioannidis et al., "Implementing a Distributed Firewall," Proc. Computer and Communications Security (CCS), 2000; www.itsec.gov.cn/webportal/download2004_ccs-df.pdf .
4. S. Ioannidis et al., "Design and Implementation of Virtual Private Services," Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
5. S. Ioannidis, "Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments," doctoral dissertation, University of Pennsylvania, 2005.
6. M. Blaze, J. Ioannidis, and A.D. Keromytis, "Experience with the KeyNote Trust Management System: Applications and Future Directions," Proc. 1st Int'l Conf. Trust Management, 2003; http://nsl.cs.columbia.edu/projects/gridlock newkeynote.pdf.
7. A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, June 2004, pp. 62-67.
8. W.H. Winsborough and N. Li, "Safety in Automated Trust Negotiation," Proc. IEEE Symp. Security &Privacy, IEEE Press, 2004, pp. 147-160.
9. A.D. Keromytis et al., "The Strongman Architecture," Proc. 3rdDARPA Information Survivability Conf. and Exposition (DISCEX III), 2003; www1.cs.columbia.edu/~angelos/Papersstrongman.pdf .
10. A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," Proc. 9th Usenix Security Symposium, Usenix, 2000; www.csd.uoc.gr/~hy558/paperssomayaji00automated.pdf .
11. M.E. Locasto et al., "Towards Collaborative Security and P2P Intrusion Detection," Proc. 6th Ann. IEEE SMC Information Assurance Workshop (IAW), IEEE Press, 2005, pp. 333-339.
12. M. Blaze, J. Ioannidis, and A.D. Keromytis, "Offline Micropayments without Trusted Hardware," Proc. 5th Financial Cryptography (FC) Conf., 2001; www.crypto.com/papersknpay.pdf.

Index Terms:
Global Information Grid, trust management, service-oriented architecture, virtual private services
Citation:
Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee, "Dynamic Trust Management," Computer, vol. 42, no. 2, pp. 44-52, Feb. 2009, doi:10.1109/MC.2009.51
Usage of this product signifies your acceptance of the Terms of Use.