Implementing Trust Negotiations In Multisession Transactions
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
A trust negotiation is a mutual attribute-based authorization protocol between two entities. Trust Negotiation is an approach to regulate the exchange of sensitive information during this process. The proposed framework is a multisession dependable approach to trust negotiations. This framework supports voluntary and unpredicted interruptions, enabling the negotiating parties to complete the negotiation despite temporary unavailability of resources. The Trust-x protocol addresses the issues related to validity, temporary loss of data, and extended unavailability of one of the two negotiators. A peer is able to suspend an ongoing negotiation and resume it with another (authenticated) peer. Negotiation portions and intermediate states can be safely and privately passed among peers, to guarantee the stability needed to continue suspended negotiations. Detailed analysis has been depicted on Trust-x protocol which has several key properties, including validity, correctness, and minimalist. This system also withstands the most significant attacks. An ontology environment is also proposed to provide formal specification of concepts and their interrelationships. This is very essential in complex web service environments. It possesses the purpose of sharing information about credentials and their attributes, needed for establishing trust.
Authors and Affiliations
S. Seetha , M. Ramamoorthy
Design of Local Oscillator Circuit for FINFET and SET
— Nanometer scale devices have the potential of replacing the CMOS based device as because of low power operation. Nanotechnology is the new and challenging field or technology of 21st century. Researchers were t...
A Comprehensive Study of Major Techniques of Facial Expression Recognition
Facial Expression Recognition is one of the challenging and active research topic in the recent years. Facial Expression Recognition System comprises the detection of face, facial feature extraction and classificat...
Analysis and Design of 3 LSB Techniques for Secure Audio Steganography
Information hiding has evolved since 1970’s and has become an integral part of internet in present century. This has been a keystone in the field of Information communication, as it saves data from losses, attacks and an...
Transformation of Graph Partitions into Problem Domain in Digital Circuit Layout
The digital circuit layout problem is a constrained optimization problem in the combinatorial sense. It is accomplished in several stages such as partitioning, floorplanning, placement and routing with each step being...
Improving Memory Access time by Building an AMBA AHB compliant Memory Controller
Memory access time has been a bottleneck in many microprocessor applications which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the...