Trust negotiation is a promising approach for establishing trust in open systems, where sensitive interactions may often occur between entities with no prior knowledge of each other. Although several proposals today exist of systems for the management of trust negotiations none of them addresses in a comprehensive way the problem of privacy preservation. Privacy is today one of the major concerns of users exchanging information through the Web and thus we believe that trust negotiation systems must effectively address privacy issues to be widely acceptable. For these reasons, in this paper we investigate privacy in the context of trust negotiations. More precisely, we propose a set of privacy preserving features to be included in any trust ...
Web Services is a new direction for businesses to extend the scope of their business applications ou...
Trust negotiation supports authentication and access control across multiple security domains by all...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
The increasing use of Internet in a variety of distributed multiparty interactions and transactions ...
Abstract — Concerns of users about the privacy of their data are becoming more important to provider...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
Trust negotiation makes it possible for two parties to carry on secure transactions by first establi...
This paper examines how negotiation techniques can resolve the trade-off between service providers ’...
Abstract. This paper examines how service providers may resolve the trade-off between their personal...
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iter...
International audienceConcerns of users about privacy of their personal data are of higher and highe...
As business transactions migrate into electronic marketplaces, most interactions will occur between...
This paper examines how service providers may re-solve the trade-off between their personalization e...
Web Services is a new direction for businesses to extend the scope of their business applications ou...
Trust negotiation supports authentication and access control across multiple security domains by all...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
The increasing use of Internet in a variety of distributed multiparty interactions and transactions ...
Abstract — Concerns of users about the privacy of their data are becoming more important to provider...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
Trust negotiation makes it possible for two parties to carry on secure transactions by first establi...
This paper examines how negotiation techniques can resolve the trade-off between service providers ’...
Abstract. This paper examines how service providers may resolve the trade-off between their personal...
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iter...
International audienceConcerns of users about privacy of their personal data are of higher and highe...
As business transactions migrate into electronic marketplaces, most interactions will occur between...
This paper examines how service providers may re-solve the trade-off between their personalization e...
Web Services is a new direction for businesses to extend the scope of their business applications ou...
Trust negotiation supports authentication and access control across multiple security domains by all...
In open systems like the Internet, traditional approaches to security based on identity do not provi...