Implementing Trust Negotiations In Multisession Transactions
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
A trust negotiation is a mutual attribute-based authorization protocol between two entities. Trust Negotiation is an approach to regulate the exchange of sensitive information during this process. The proposed framework is a multisession dependable approach to trust negotiations. This framework supports voluntary and unpredicted interruptions, enabling the negotiating parties to complete the negotiation despite temporary unavailability of resources. The Trust-x protocol addresses the issues related to validity, temporary loss of data, and extended unavailability of one of the two negotiators. A peer is able to suspend an ongoing negotiation and resume it with another (authenticated) peer. Negotiation portions and intermediate states can be safely and privately passed among peers, to guarantee the stability needed to continue suspended negotiations. Detailed analysis has been depicted on Trust-x protocol which has several key properties, including validity, correctness, and minimalist. This system also withstands the most significant attacks. An ontology environment is also proposed to provide formal specification of concepts and their interrelationships. This is very essential in complex web service environments. It possesses the purpose of sharing information about credentials and their attributes, needed for establishing trust.
Authors and Affiliations
S. Seetha , M. Ramamoorthy
FPGA IMPLEMENTATION OF FOUR PHASE CODE DESIGN USING MODIFIED GENETIC ALGORITHM (MGA)
The proposed architecture consists of an efficient VLSI hardware implementation of the Modified Genetic Algorithm for identifying the good pulse compression sequences based on Discrimination Factor. The main advantag...
Comparison of Band-stop FIR Filter using Modified Hamming Window and Other Window functions and Its Application in Filtering a Mutitone Signal
In this paper Matlab program is used to implement a Band-stop FIR filter using modified coefficient of the Hamming window function and its application in filtering a Multitone input signal. FIR filter designed usin...
An efficient unobservable routing scheme resistant against DoS attacks
Privacy protection for ad hoc networks with low-power wireless devices and lowbandwidth network connection is a very challenging task. A number of anonymous routing schemes have been proposed for ad hoc networks to...
Blind Image De-convolution In Surveillance Systems By Genetic Programming
surveillance systems has an important part as a Image acquisition and filtering, segmentation, object detection and tracking the object in that image. In blind image de-convolution .most of the methods requires tha...
Speech based Emotion Recognition with Gaussian Mixture Model
This paper is mainly concerned with speech based emotion recognition. The main work is concerned with Gaussian mixture model (GMM model) which allows training the desired data set from the databases. GMM are known...