skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: TRUSTBUILDER2

Abstract

In trust negotiation, resource providers specify access control policies in terms of the attributes that should be possessed by authorized users, rather than the identities of these users. Users can prove ownership of certain attributes through the use of digital credentials issued by trusted entities. For example, the Department of Motor Vehicles might issue vehicle owners X.509 driver's licenses that can be used to demonstrate proof of their current age, address, or ability to drive. These types of digital credentials may also be protected by user-specified policies controlling their release to remote parties; for example, Alice might only be willing to show her VISA card credential to members of the Better Business Bureau. In this way, a request to access a given resource can result in a bilateral and iterative exchange of policies and credentials that represents a negotiation between the participating parties. To date, research interest in trust negotiation has been primarily theoretical and any implementations have been largely proofs of concept; experimenting with these prototypes is often not a straightforward task. TrustBuilder2 is a flexible framework for supporting research in the area trust negotiation protocols, designed to allow researchers to quickly prototype and experiment with various approaches tomore » trust negotiation. In TrustBuilder2, the primary components of a trust negotiation system are represented using abstract interfaces.« less

Authors:
;
Publication Date:
Research Org.:
Sandia National Laboratories
Sponsoring Org.:
USDOE
OSTI Identifier:
1231019
Report Number(s):
TRUSTBUILDER2; 002116MLTPL00
DOE Contract Number:
DE-AC04-94AL85000
Resource Type:
Software
Software Revision:
00
Software Package Number:
002116
Software Package Contents:
Media Directory; Software Abstract; Media includes Source Code; Compilation Instructions; Programmer Documentation; Installation Instructions; Sample Problem Input Data; and User Guide;/1 CD ROM
Software CPU:
MLTPL
Open Source:
No
Source Code Available:
Yes
Related Software:
Java JDK version 1.5 or greater
Country of Publication:
United States

Citation Formats

Lee, Adam J., and Perano, Kenneth J. TRUSTBUILDER2. Computer software. Vers. 00. USDOE. 15 May. 2007. Web.
Lee, Adam J., & Perano, Kenneth J. (2007, May 15). TRUSTBUILDER2 (Version 00) [Computer software].
Lee, Adam J., and Perano, Kenneth J. TRUSTBUILDER2. Computer software. Version 00. May 15, 2007.
@misc{osti_1231019,
title = {TRUSTBUILDER2, Version 00},
author = {Lee, Adam J. and Perano, Kenneth J.},
abstractNote = {In trust negotiation, resource providers specify access control policies in terms of the attributes that should be possessed by authorized users, rather than the identities of these users. Users can prove ownership of certain attributes through the use of digital credentials issued by trusted entities. For example, the Department of Motor Vehicles might issue vehicle owners X.509 driver's licenses that can be used to demonstrate proof of their current age, address, or ability to drive. These types of digital credentials may also be protected by user-specified policies controlling their release to remote parties; for example, Alice might only be willing to show her VISA card credential to members of the Better Business Bureau. In this way, a request to access a given resource can result in a bilateral and iterative exchange of policies and credentials that represents a negotiation between the participating parties. To date, research interest in trust negotiation has been primarily theoretical and any implementations have been largely proofs of concept; experimenting with these prototypes is often not a straightforward task. TrustBuilder2 is a flexible framework for supporting research in the area trust negotiation protocols, designed to allow researchers to quickly prototype and experiment with various approaches to trust negotiation. In TrustBuilder2, the primary components of a trust negotiation system are represented using abstract interfaces.},
doi = {},
year = {Tue May 15 00:00:00 EDT 2007},
month = {Tue May 15 00:00:00 EDT 2007},
note =
}

Software:
To order this software, request consultation services, or receive further information, please fill out the following request.

Save / Share:

To initiate an order for this software, request consultation services, or receive further information, fill out the request form below. You may also reach us by email at: .

OSTI staff will begin to process an order for scientific and technical software once the payment and signed site license agreement are received. If the forms are not in order, OSTI will contact you. No further action will be taken until all required information and/or payment is received. Orders are usually processed within three to five business days.

Software Request

(required)
(required)
(required)
(required)
(required)
(required)
(required)
(required)