Identity-based long running negotiations

Anna Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Identity based negotiations are convenient protocols to closely control users' personal data, that empower users to negotiate the trust of unknown counterparts by carefully governing the disclosure of their identities. Such type of negotiations presents, however, unique challenges, mainly caused by the way identity attributes are distributed and managed. In this paper we present novel approach for conducting long running negotiations in the context of digital identity management systems. We propose some major extensions to an existing trust negotiation protocol to support negotiations that are conducted during multiple sessions. To the best of our knowledge, this is the first time a protocol for conducting trust negotiations over multiple sessions is presented.

Original languageEnglish (US)
Title of host publicationProceedings of the 4th ACM Workshop on Digital Identity Management, DIM'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Pages97-105
Number of pages9
DOIs
StatePublished - Dec 1 2008
Event4th ACM Workshop on Digital Identity Management, DIM'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 - Alexandria, VA, United States
Duration: Oct 27 2008Oct 31 2008

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other4th ACM Workshop on Digital Identity Management, DIM'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
CountryUnited States
CityAlexandria, VA
Period10/27/0810/31/08

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Identity-based long running negotiations'. Together they form a unique fingerprint.

  • Cite this

    Squicciarini, A., Trombetta, A., Bertino, E., & Braghin, S. (2008). Identity-based long running negotiations. In Proceedings of the 4th ACM Workshop on Digital Identity Management, DIM'08,Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 (pp. 97-105). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1456424.1456440