@inproceedings{8cd07da15c8d4c38a23c77be4785d75e,
title = "An interactive trust management and negotiation scheme",
abstract = "Interactive access control allows a server to compute on the fly missing credentials needed to grant access and to adapt its responses on the basis of client's presented and declined credentials. Yet, it may disclose too much information on what credentials a client needs. Automated trust negotiation allows for a controlled disclosure on what credentials a client has during a mutual disclosure process. Yet, it requires pre-arranged policies and sophisticated strategies. How do we bootstrap from simple security policies a comprehensive interactive trust management and negotiation scheme that combines the best of both worlds without their limitations? This is the subject of the paper. {\textcopyright} 2005 by International Federation for Information Processing.",
author = "H. Koshutanski and F. Massacci",
year = "2005",
doi = "10.1007/0-387-24098-5_9",
language = "English",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "115--128",
booktitle = "Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust and World Computer Congress, FAST 2004",
note = "IFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust, FAST 2004 ; Conference date: 22-08-2004 Through 27-08-2004",
}