{"id":"https://openalex.org/W2159185791","doi":"https://doi.org/10.1145/1133058.1133066","title":"Traust","display_name":"Traust","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W2159185791","doi":"https://doi.org/10.1145/1133058.1133066","mag":"2159185791"},"language":"en","primary_location":{"id":"doi:10.1145/1133058.1133066","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1133058.1133066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eleventh ACM symposium on Access control models and technologies  - SACMAT '06","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032842781","display_name":"Adam J. Lee","orcid":"https://orcid.org/0000-0002-2596-7256"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adam J. Lee","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, IL"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, IL","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011314280","display_name":"Marianne Winslett","orcid":"https://orcid.org/0000-0002-3935-7168"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marianne Winslett","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, IL"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, IL","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073906712","display_name":"Jim Basney","orcid":"https://orcid.org/0000-0002-0139-0640"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jim Basney","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, IL"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, IL","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042723051","display_name":"Von Welch","orcid":"https://orcid.org/0000-0002-5896-7789"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Von Welch","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, IL"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, IL","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032842781"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":27.6629,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.99462105,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"39","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7784311175346375},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5702310800552368},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5572465658187866},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.5362561941146851},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47906169295310974},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4660811126232147},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.4557908773422241},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4489627480506897},{"id":"https://openalex.org/keywords/bureaucracy","display_name":"Bureaucracy","score":0.43141457438468933},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4277230501174927},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42497074604034424},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.41396987438201904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3754870593547821},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.36965411901474},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20068737864494324},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15076729655265808},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09278389811515808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7784311175346375},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5702310800552368},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5572465658187866},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.5362561941146851},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47906169295310974},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4660811126232147},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.4557908773422241},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4489627480506897},{"id":"https://openalex.org/C51575053","wikidata":"https://www.wikidata.org/wiki/Q72468","display_name":"Bureaucracy","level":3,"score":0.43141457438468933},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4277230501174927},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42497074604034424},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.41396987438201904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3754870593547821},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.36965411901474},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20068737864494324},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15076729655265808},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09278389811515808},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1133058.1133066","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1133058.1133066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the eleventh ACM symposium on Access control models and technologies  - SACMAT '06","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320312143","display_name":"National Centre for Supercomputing Applications","ror":"https://ror.org/03r10zj06"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W63070088","https://openalex.org/W158033927","https://openalex.org/W1482251990","https://openalex.org/W1498316612","https://openalex.org/W1498935301","https://openalex.org/W1501620459","https://openalex.org/W1507858616","https://openalex.org/W1513220863","https://openalex.org/W1520961854","https://openalex.org/W1574845526","https://openalex.org/W1580858050","https://openalex.org/W1733713784","https://openalex.org/W1775663022","https://openalex.org/W1847909677","https://openalex.org/W1968556863","https://openalex.org/W1990041627","https://openalex.org/W2004559305","https://openalex.org/W2029693536","https://openalex.org/W2033820870","https://openalex.org/W2039360564","https://openalex.org/W2065076704","https://openalex.org/W2077298707","https://openalex.org/W2104492843","https://openalex.org/W2105176326","https://openalex.org/W2106299022","https://openalex.org/W2106539366","https://openalex.org/W2113467413","https://openalex.org/W2120846431","https://openalex.org/W2123479684","https://openalex.org/W2124228505","https://openalex.org/W2130103312","https://openalex.org/W2130363607","https://openalex.org/W2131165582","https://openalex.org/W2133884536","https://openalex.org/W2138798600","https://openalex.org/W2138916465","https://openalex.org/W2139065157","https://openalex.org/W2141420453","https://openalex.org/W2150500287","https://openalex.org/W2150623502","https://openalex.org/W2157689518","https://openalex.org/W2167800525","https://openalex.org/W2170496240","https://openalex.org/W2293059766","https://openalex.org/W2527879653","https://openalex.org/W2970097841","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2132693790","https://openalex.org/W2367441718","https://openalex.org/W2017675414","https://openalex.org/W2017616439","https://openalex.org/W4390045902","https://openalex.org/W1593822213"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"trust":[3],"negotiation":[4],"(TN)":[5],"has":[6],"been":[7,65],"proposed":[8],"as":[9,62,119],"a":[10,36,44,85,104,221],"novel":[11],"access":[12,125,142,214],"control":[13],"solution":[14,38],"for":[15,39,51,127,172,220],"use":[16,135],"in":[17,21,129],"open":[18,131],"system":[19,132],"environments":[20,41],"which":[22,53,90],"resources":[23,128],"are":[24],"shared":[25],"across":[26],"organizational":[27],"boundaries.":[28],"Researchers":[29],"have":[30,54,64],"shown":[31],"that":[32,108,123],"TN":[33,52,71,115,136,177],"is":[34,83],"indeed":[35],"viable":[37],"these":[40],"by":[42,198],"developing":[43],"number":[45],"of":[46,77,95,112,176,192,224],"policy":[47],"languages":[48],"and":[49,87,190,202,228],"strategies":[50],"desirable":[55],"theoretical":[56],"properties.":[57],"Further,":[58],"existing":[59,81,113,164],"protocols,":[60],"such":[61],"TLS,":[63],"altered":[66],"to":[67,137,149,152,212,215,231],"interact":[68],"with":[69,157,163],"prototype":[70],"systems,":[72],"thereby":[73],"illustrating":[74],"the":[75,93,110,139,170,173,188,194,199,225],"utility":[76],"TN.":[78],"Unfortunately,":[79],"modifying":[80],"protocols":[82],"often":[84],"time-consuming":[86],"bureaucratic":[88],"process":[89],"can":[91],"hinder":[92],"adoption":[94,175],"this":[96,99,167],"promising":[97],"technology.In":[98],"paper,":[100],"we":[101],"present":[102],"Traust,":[103,193],"third-party":[105],"authorization":[106,121],"service":[107],"leverages":[109],"strengths":[111],"proto-type":[114],"systems.":[116],"Traust":[117,145,151,200,211],"acts":[118],"an":[120,130],"broker":[122,213],"issues":[124],"tokens":[126],"after":[133],"entities":[134],"satisfy":[138],"appropriate":[140],"resource":[141],"policies.":[143],"The":[144],"architecture":[146],"was":[147],"designed":[148],"allow":[150],"be":[153],"integrated":[154],"either":[155],"directly":[156],"newer":[158],"trust-aware":[159],"applications":[160],"or":[161,183],"indirectly":[162],"legacy":[165,216],"applications;":[166],"exibility":[168],"paves":[169],"way":[171],"incremental":[174],"technologies":[178],"without":[179],"requiring":[180],"widespread":[181],"software":[182],"protocol":[184,196],"upgrades.":[185],"We":[186,205],"discuss":[187,207],"design":[189],"implementation":[191],"communication":[195],"used":[197],"system,":[201],"its":[203],"performance.":[204],"also":[206],"our":[208,218],"experiences":[209],"using":[210],"resources,":[217],"proposal":[219],"Traust-aware":[222],"version":[223],"GridFTP":[226],"protocol,":[227],"Traust's":[229],"resilience":[230],"attack.":[232]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2016-06-24T00:00:00"}
