{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:07:08Z","timestamp":1763467628845,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2004,8,1]],"date-time":"2004-08-01T00:00:00Z","timestamp":1091318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2004,8]]},"abstract":"<jats:p>The focus of access control in client\/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources is usually static, and an access control policy associated with each resource specifies who is authorized to access the resource. In this article, we turn the traditional client\/server access control model on its head and address how to protect the sensitive content that clients disclose to and receive from servers. Since client content is often dynamically generated at run-time, the usual approach of associating a policy with the resource (content) a priori does not work. We propose a general-purpose access control model designed to detect whenever sensitive information is being transmitted, and determine whether the sender or receiver is authorized. The model identifies sensitive content, maps the sensitive content to an access control policy, and establishes the trustworthiness of the sender or receiver before the sensitive content is disclosed or received. We have implemented the model within TrustBuilder, an architecture for negotiating trust between strangers based on properties other than identity. The implementation targets open systems, where clients and servers do not have preexisting trust relationships. The implementation is the first example of content-triggered trust negotiation. It currently supports access control for sensitive content disclosed by web and email clients.<\/jats:p>","DOI":"10.1145\/1015040.1015044","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:38:56Z","timestamp":1097170736000},"page":"428-456","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Content-triggered trust negotiation"],"prefix":"10.1145","volume":"7","author":[{"given":"Adam","family":"Hess","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Jason","family":"Holt","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Jared","family":"Jacobson","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Kent E.","family":"Seamons","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2004,8]]},"reference":[{"volume-title":"Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press","author":"Bertino E.","key":"e_1_2_1_1_1","unstructured":"Bertino , E. , Castano , S. , and Ferrari , E . 2001. On specifying security policies for web documents with an XML-based language . In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press , Chantilly, VA, 57--65.]] 10.1145\/373256.373264 Bertino, E., Castano, S., and Ferrari, E. 2001. On specifying security policies for web documents with an XML-based language. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press, Chantilly, VA, 57--65.]] 10.1145\/373256.373264"},{"volume-title":"Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). ACM Press, 134--143","author":"Bonatti P.","key":"e_1_2_1_2_1","unstructured":"Bonatti , P. and Samarati , P . 2000. Regulating service access and information release on the web . In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). ACM Press, 134--143 .]] 10.1145\/352600.352620 Bonatti, P. and Samarati, P. 2000. Regulating service access and information release on the web. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). ACM Press, 134--143.]] 10.1145\/352600.352620"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of Crypto","volume":"2139","author":"Boneh D.","year":"2001","unstructured":"Boneh , D. and Franklin , M . 2001. Identity-based encryption from the Weil pairing . In Proceedings of Crypto 2001 . Lecture Notes in Computer Science , vol. 2139 . Springer, Berlin 213--229.]] Boneh, D. and Franklin, M. 2001. Identity-based encryption from the Weil pairing. In Proceedings of Crypto 2001. Lecture Notes in Computer Science, vol. 2139. Springer, Berlin 213--229.]]"},{"volume-title":"Seventh ACM Symposium on Access Control Models and Technologies","author":"Chadwick D.","key":"e_1_2_1_4_1","unstructured":"Chadwick , D. and Otenko , A . 2002. The permis X.509 role based privilege management infrastructure . In Seventh ACM Symposium on Access Control Models and Technologies , Monterey, California.]] 10.1145\/507711.507732 Chadwick, D. and Otenko, A. 2002. The permis X.509 role based privilege management infrastructure. In Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California.]] 10.1145\/507711.507732"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Dierks T. and Allen C. 1999. The TLS protocol version 1.0. Available at http:\/\/www.ietf.org\/ rfc\/rfc2246.txt.]]   Dierks T. and Allen C. 1999. The TLS protocol version 1.0. Available at http:\/\/www.ietf.org\/ rfc\/rfc2246.txt.]]","DOI":"10.17487\/rfc2246"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Fielding R. Gettys J. Mogul J. Frystyk H. Masinter L. Leach P. and Berners-Lee T. 1999. Hypertext transfer protocol---HTTP\/1.1. RFC 2616.]]   Fielding R. Gettys J. Mogul J. Frystyk H. Masinter L. Leach P. and Berners-Lee T. 1999. Hypertext transfer protocol---HTTP\/1.1. RFC 2616.]]","DOI":"10.17487\/rfc2616"},{"key":"e_1_2_1_7_1","volume-title":"Y., Mihaeli, J., Naor, D.","author":"Herzberg A.","year":"2000","unstructured":"Herzberg , A. , Mass , Y., Mihaeli, J., Naor, D. , and Ravid, Y. 2000 . Access control meets public key infrastructure, or assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press , 2--14.]] Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., and Ravid, Y. 2000. Access control meets public key infrastructure, or assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 2--14.]]"},{"volume-title":"Network and Distributed System Security Symposium","author":"Hess A.","key":"e_1_2_1_9_1","unstructured":"Hess , A. , Jacobson , J. , Mills , H. , Wamsley , R. , Seamons , K. E. , and Smith , B . 2002. Advanced client\/server authentication in TLS . In Network and Distributed System Security Symposium , San Diego, CA. 203--214.]] Hess, A., Jacobson, J., Mills, H., Wamsley, R., Seamons, K. E., and Smith, B. 2002. Advanced client\/server authentication in TLS. In Network and Distributed System Security Symposium, San Diego, CA. 203--214.]]"},{"volume-title":"2nd ACM Workshop on Privacy in the Electronic Society. ACM Press, Washington, D.C., 1--8.]] 10","author":"Holt J.","key":"e_1_2_1_10_1","unstructured":"Holt , J. , Bradshaw , R. , Seamons , K. E. , and Orman , H . 2003. Hidden credentials . In 2nd ACM Workshop on Privacy in the Electronic Society. ACM Press, Washington, D.C., 1--8.]] 10 .1145\/1005140.1005142 Holt, J., Bradshaw, R., Seamons, K. E., and Orman, H. 2003. Hidden credentials. In 2nd ACM Workshop on Privacy in the Electronic Society. ACM Press, Washington, D.C., 1--8.]] 10.1145\/1005140.1005142"},{"volume-title":"Authentication Framework","author":"International Telecommunication Union X.","key":"e_1_2_1_11_1","unstructured":"International Telecommunication Union 1997. Rec. X. 509--- Information Technology ---Open Systems Interconnection---The Directory : Authentication Framework . International Telecommunication Union .]] International Telecommunication Union 1997. Rec. X.509---Information Technology---Open Systems Interconnection---The Directory: Authentication Framework. International Telecommunication Union.]]"},{"volume-title":"4th International Workshop on Policies for Distributed Systems and Networks","author":"Kagal L.","key":"e_1_2_1_13_1","unstructured":"Kagal , L. , Finin , T. , and Johshi , A . 2003. A policy language for pervasive computing environment . In 4th International Workshop on Policies for Distributed Systems and Networks , Lake Como, Italy. 63--76.]] Kagal, L., Finin, T., and Johshi, A. 2003. A policy language for pervasive computing environment. In 4th International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy. 63--76.]]"},{"volume-title":"2nd International Semantic Web Conference","author":"Kagal L.","key":"e_1_2_1_14_1","unstructured":"Kagal , L. , Finin , T. , and Joshi , A . 2003. A policy based approach to security to the semantic web . In 2nd International Semantic Web Conference , Sanibel Island, FL.]] Kagal, L., Finin, T., and Joshi, A. 2003. A policy based approach to security to the semantic web. In 2nd International Semantic Web Conference, Sanibel Island, FL.]]"},{"volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 114--130","author":"Li N.","key":"e_1_2_1_15_1","unstructured":"Li , N. , Mitchell , J. C. , and Winsborough , W. H . 2002. Design of a role-based trust management framework . In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 114--130 .]] Li, N., Mitchell, J. C., and Winsborough, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 114--130.]]"},{"key":"e_1_2_1_16_1","unstructured":"Liberty Alliance Project\n    .\n   Available at http:\/\/www.projectliberty.org \n  2002\n  . http:\/\/www.projectliberty. org.]]  Liberty Alliance Project. Available at http:\/\/www.projectliberty.org 2002. http:\/\/www.projectliberty. org.]]"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(91)90210-H"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Postel J. 1982. Simple Mail Transfer Protocol. RFC 821.]]   Postel J. 1982. Simple Mail Transfer Protocol. RFC 821.]]","DOI":"10.17487\/rfc0821"},{"volume-title":"SSL and TLS: Designing and Building Secure Systems","author":"Rescorla E.","key":"e_1_2_1_19_1","unstructured":"Rescorla , E. 2001. SSL and TLS: Designing and Building Secure Systems . Addison-Wesley .]] Rescorla, E. 2001. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.]]"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/321439.321441"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"volume-title":"Network and Distributed System Security Symposium","author":"Seamons K. E.","key":"e_1_2_1_22_1","unstructured":"Seamons , K. E. , Winslett , M. , and Yu , T . 2001. Limiting the disclosure of access control policies during automated trust negotiation . In Network and Distributed System Security Symposium , San Diego, CA. 109--124.]] Seamons, K. E., Winslett, M., and Yu, T. 2001. Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, San Diego, CA. 109--124.]]"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy","author":"Seamons K. E.","year":"2002","unstructured":"Seamons , K. E. , Winslett , M. , Yu , T. , Smith , B. , Child , E. , Jacobsen , J. , Mills , H. , and Yu , L . 2002. Requirements for policy languages for trust negotiation . In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002 ). IEEE Computer Society Press, 68--79.]] Seamons, K. E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobsen, J., Mills, H., and Yu, L. 2002. Requirements for policy languages for trust negotiation. In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Computer Society Press, 68--79.]]"},{"volume-title":"2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag","author":"Seamons K. E.","key":"e_1_2_1_24_1","unstructured":"Seamons , K. E. , Winslett , M. , Yu , T. , Yu , L. , and Jarvis , R . 2002. Protecting privacy during on-line trust negotiation . In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag , San Francisco, CA, 129--143.]] Seamons, K. E., Winslett, M., Yu, T., Yu, L., and Jarvis, R. 2002. Protecting privacy during on-line trust negotiation. In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, San Francisco, CA, 129--143.]]"},{"key":"e_1_2_1_25_1","unstructured":"Shin D. Ahn G. and Cho S. 2002. Role-based EAM using X509 attribute certificate. In 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security University of Cambridge United Kingdom.]]  Shin D. Ahn G. and Cho S. 2002. Role-based EAM using X509 attribute certificate. In 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security University of Cambridge United Kingdom.]]"},{"volume-title":"2nd International Semantic Web Conference","author":"Tonti G.","key":"e_1_2_1_26_1","unstructured":"Tonti , G. , Bradshaw , J. M. , Jeffers , R. , Montanari , R. , Suri , N. , and Uszok , A . 2003. Semantic web languages for policy representation and reasoning: A comparison of Kaos, Rei, and Ponder . In 2nd International Semantic Web Conference , Sanibel Island, FL.]] Tonti, G., Bradshaw, J. M., Jeffers, R., Montanari, R., Suri, N., and Uszok, A. 2003. Semantic web languages for policy representation and reasoning: A comparison of Kaos, Rei, and Ponder. In 2nd International Semantic Web Conference, Sanibel Island, FL.]]"},{"volume-title":"4th International Workshop on Policies for Distributed Systems and Networks","author":"Uszok A.","key":"e_1_2_1_27_1","unstructured":"Uszok , A. , Bradshaw , J. , Jeffers , R. , Suri , N. , Hayes , P. , Breedy , M. , Bunch , L. , Johnson , M. , Kulkarni , S. , and Lott , J . 2003. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement . In 4th International Workshop on Policies for Distributed Systems and Networks , Lake Como, Italy, 93--98.]] Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., and Lott, J. 2003. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In 4th International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, 93--98.]]"},{"key":"e_1_2_1_28_1","unstructured":"W3C http:\/\/www.w3.org\/TR\/WD-P3P\/Overview.html. Platform for Privacy Preferences (P3P) Specification. W3C http:\/\/www.w3.org\/TR\/WD-P3P\/Overview.html.]]  W3C http:\/\/www.w3.org\/TR\/WD-P3P\/Overview.html. Platform for Privacy Preferences (P3P) Specification. W3C http:\/\/www.w3.org\/TR\/WD-P3P\/Overview.html.]]"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy","author":"Winsborough W. H.","year":"2002","unstructured":"Winsborough , W. H. and Li , N . 2002. Towards practical automated trust negotiation . In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002 ). IEEE Computer Society Press, Monterey, CA, 92--103.]] Winsborough, W. H. and Li, N. 2002. Towards practical automated trust negotiation. In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Computer Society Press, Monterey, CA, 92--103.]]"},{"volume-title":"DARPA Information Survivability Conference and Exposition","author":"Winsborough W. H.","key":"e_1_2_1_30_1","unstructured":"Winsborough , W. H. , Seamons , K. E. , and Jones , V. E . 2000. Automated trust negotiation . In DARPA Information Survivability Conference and Exposition , Vol. I . IEEE Press, Hilton Head, SC, 88--102.]] Winsborough, W. H., Seamons, K. E., and Jones, V. E. 2000. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Vol. I. IEEE Press, Hilton Head, SC, 88--102.]]"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605435"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015040.1015044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015040.1015044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:32Z","timestamp":1750286612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015040.1015044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,8]]}},"alternative-id":["10.1145\/1015040.1015044"],"URL":"https:\/\/doi.org\/10.1145\/1015040.1015044","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2004,8]]},"assertion":[{"value":"2004-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}