Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Interoperable Credentials Management For Wholesale Banking, Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older Feb 2011

Interoperable Credentials Management For Wholesale Banking, Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older

Electrical Engineering and Computer Science - All Scholarship

A gap exists between wholesale-banking business practices and security best practices: wholesale banks operate within the boundaries of contract law, while security best practices often relies upon a benevolent trusted party outside the scope of straightforward contracts. While some business domains may be able to bridge this gap, the ultra-high-value transactions used in business-to-business banking substantially increase the size of the gap. The gap becomes most apparent when regarded from the perspective of interoperability. If a single user applies the same credential to sign high-value transactions at multiple banks, then the trusted-party model becomes overly cumbersome and conflicts with an …


Making Agents Secure On The Semantic Web, Csilla Farkas, Michael N. Huhns Jan 2002

Making Agents Secure On The Semantic Web, Csilla Farkas, Michael N. Huhns

Faculty Publications

Agents were designed to collaborate and share information. While highly desirable for interoperability, this feature is scary from the security perspective. Illegal inferences, supported by semantic Web technology and ontologies, might enable users to access unauthorized information. In addition to semantic associations and replicated data with different sensitivity, malicious agents could also exploit statistical inferences. Although each agent in a system might behave in a desired and secure way, their combined knowledge could be used to disclose sensitive data. The research community must therefore develop and implement techniques that allow control over released data. To answer the questions related to …