Please wait a minute...
New Technology of Library and Information Service  2008, Vol. 24 Issue (9): 1-9    DOI: 10.11925/infotech.1003-3513.2008.09.01
article Current Issue | Archive | Adv Search |
Framework and Model of Trust Negotiation for Digital Library Services
Li Yu  Zhang Xiaolin 
(National Science Library, Chinese Academy of Sciences, Beijing 100190, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This research focuses on the basic model and technical mechanism for trust negotiation between friendly systems to support users without prior trust (authorization) to be able to access dynamically discovered digital library services.

Key wordsTrust negotiation      Trust negotiation engine      Trust negotation between friend-of-friend services      Trust calculation      Digital library services     
Received: 27 May 2008      Published: 25 September 2008
: 

TP391.1

 
Corresponding Authors: Li Yu     E-mail: liy@mail.las.ac.cn
About author:: Li Yu,Zhang Xiaolin

Cite this article:

Li Yu,Zhang Xiaolin . Framework and Model of Trust Negotiation for Digital Library Services. New Technology of Library and Information Service, 2008, 24(9): 1-9.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2008.09.01     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2008/V24/I9/1

[1] 张晓林.开放数字图书馆的设计与实现:CSDL的实践[J].情报学报,2003,22(5):520-525.
[2] Lee W.Towards Agent-based Decision Making in the Electronic Marketplace: Interactive Recommendation and Automated Negotiation[J].Expert Systems with Applications,2004,27(4):665-679.
[3] ebXML - Enabling a Global Electronic Market.[EB/OL]. [2008-05-18]. http://www.ebxml.org/.
[4] ebXML CPPA. Automated Negotiation of Collaboration-protocol Agreements Specification Version 0.04[EB/OL]. [2008-05-18]. http://www.oasis-open.org/committees/documents.php?wg_abbrev=ebxml-cppa-negot.
[5] Yu T, WINSLETT M, Seamons K.Supporting Structured Credentials and Sensitive Policies Through Interoperable Strategies for Automated Trust Negotiation[J].ACM Transactions on Information and System Security, 2003,6(1):1-42.
[6] Chiu D K W, Cheung S C, Hung P C K,et al.Developing e-Negotiation Support with a Meta-modeling Approach in a Web Services Environment[J].Decision Support Systems, 2005,40(1):51-69.
[7] Liu X, Wirtz K W.Sequential Negotiation in Multiagent Systems for Oil Spill Response Decision-making[J].Marine Pollution Bulletin,2005,50(4):469-474
[8] Lin R J, Chou S T.Mediating a Bilateral Multi-issue Negotiation[J]. Electronic Commerce Research and Applications,2004,3(2):126-138.
[9] Seamons K E, Winslett M, Yu T et al.Protecting Privacy During on Line Trust Negotiation[J]. Lecture Notes in Computer Science, 2003,2482(1):249-253.
[10] Bertino E, Ferrari E, Squicciarini A.Trust Negotiations: Concepts, Systems, and Languages[J].Computing in Science & Engineering,2004,6(4):27-34.
[11] Skogsrud H, Benatallah B, Casati F. Trust-serv: Model-driven Lifecycle Management of Trust Negotiation Policies for Web Services[C].In: Proceedings of the 13th International Conference on World Wide Web.New York,  USA: ACM Press, 2004:53-62.
[12] Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web [EB/OL]. [2008-05-18].http://www.learninglab.de/pdf/L3S_Project_peertrust.pdf.
[13] Grosof BN, Poon TC.SweetDeal: Representing Agent Contracts with Exceptions Using XML Rules, Ontologies, and Process Descriptions[EB/OL]. [2008-05-18].http://www2003.org/cdrom/papers/refereed/p115/p115-grosof.htm.
[14] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[15] TrustBuilder Research Projects[EB/OL]. [2008-05-18].http://isrl.cs.byu.edu/projects.html.
[16] Yu T, Ma X, Winslett M.PRUNES: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet[C].  In: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens,Greece. New York: ACM Press.2000:210-219.
[17] Li N, Mitchell J. RT: A Role-based Trust-management Framework[C]. In: Proceedings of The Third DARPA Information Survivability Conference and Exposition,Washington DC. 2003.
[18] Winsborough W H. Jacobs J.Automated Trust Negotiation Technology with Attribute-based Access Control[C]. DARPA Information Survivability Conference and Exposition, Washington DC.2003.
[19] Leithead T, Nejdl W, Olmedilla D,et al.How to Exploit Ontologies in Trust Negotiation[EB/OL]. [2008-05-18]. http://trust.mindswap.org/trustWorkshop/papers/12-f.pdf.
[20] Hung P C K, Li H, Jeng J.WS-Negotiation: An Overview of Research Issues[C].In:Proceedings of the 37th Hawaii International Conference on System Sciences,BigIsland, Hawaii,2004.
[21] KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-based Grid Architectures[EB/OL]. [2008-05-18]. http://www.agentus.com/WSABE2003/program/johnson.pdf.
[22] Bradshaw J M, Beautement P, Breedy M R,et al.Making Agents Acceptable to People[EB/OL]. [2008-05-18].http://www.ihmc.us/research/projects/KAoS/biit-jeff.pdf.
[23] Bradshaw J M, DutfieldS, Benoit P, et al. KAoS: Toward an Industrial-strength Generic Agent Architecture[M]. Software Agents. The MIT Press,1997: 375-418.
[24] HP Labs. Rei: A Policy Language for the Me-Centric Project[EB/OL]. [2008-05-18].http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html.
[25] Blaze M, Feigenbaum J, Lacy J.Decentralized Trust Management[M].In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Press.1996:164-173.
[26] Blaze M, Feigenbaum J, Ioannidis J et al.The KeyNote Trust-management System Version 2. [EB/OL]. [2008-05-18].http://www.rfc-editor.org/rfc/rfc2704.txt.
[27] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[28] TrustBuilder Research Projects[EB/OL]. [2008-05-18]. http://isrl.cs.byu.edu/projects.php.
[29] Skogsrud H, Benatallah B, Casati F.A Trust Negotiation System for Digital Library Web Services[J].International Journal on Digital Libraries, 2004,4(3):185-207.
[30] Bertino E, Ferrari E, Squicciarini A C.Trust-X: A Peer-to-Peer Framework for Trust Establishment[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7): 827-842.
[31] Granovetter M. The Strength of Weak Tie [J].The American Journal of Sociology,1973,78(6): 1360-1380.

[1] Li Wenjiang, Chen Shiqin. Design of Library Information Push System Based on Android GCM Service[J]. 现代图书情报技术, 2013, 29(11): 91-96.
[2] Hu Bing, Zhang Jianli. Research on Chinese Patent Automatic Classification Method Based on Statistical Distribution[J]. 现代图书情报技术, 2013, 29(7/8): 101-106.
[3] Li Wenjiang, Chen Shiqin. Application of AIMLBot Intelligent Robot in Real-time Virtual Reference Service[J]. 现代图书情报技术, 2012, 28(7): 127-132.
[4] Fan Yunjie, Liu Huailiang. Research on Chinese Short Text Classification Based on Wikipedia[J]. 现代图书情报技术, 2012, 28(3): 47-52.
[5] Li Jia, Zhang Pengzhu, Li Xinmiao. A Design Framework for Speech Act Taxonomy of Online Group Discussion[J]. 现代图书情报技术, 2012, 28(2): 1-9.
[6] Wang Hao, Deng Sanhong, Su Xinning. Research on Chinese Keywords Extraction Based on Characters Sequence Annotation[J]. 现代图书情报技术, 2011, 27(12): 39-45.
[7] Lu Wanhui, Ma Jianxia. Research on Complex Time Information Extraction Based on CRF Model[J]. 现代图书情报技术, 2011, 27(10): 29-33.
[8] Li Gang, Wang Zhongyi. Design and Implementation of Semantic-based Sentiment Mining System[J]. 现代图书情报技术, 2011, 27(7/8): 97-103.
[9] Li Wenjiang, Chen Shiqin. Full-text Retrieval Based on Lucene.net Application in Document Management[J]. 现代图书情报技术, 2010, 26(11): 84-89.
[10] Chen Shiqin Li Wenjiang. Information Collection of Market Quotation of Agricultural Products Based on .Net ——Taking Chongqing Market Quotation of Agricultural Products as an Examples[J]. 现代图书情报技术, 2010, 26(6): 88-92.
[11] Ding Zhiqiang,Wang Huilin. A Natural Language Understanding System Based on Glue Semantics and DRT[J]. 现代图书情报技术, 2010, 26(4): 46-52.
[12] Zhu Qingsong,Wang Huilin. A Syntactic Analysis System and Verification Platform for Chinese and English[J]. 现代图书情报技术, 2010, 26(2): 38-43.
[13] Wang Sen,Wang Yu. Algorithm of the Text Copy Detection Based on Text Structure Tree[J]. 现代图书情报技术, 2009, (10): 50-55.
[14] Li Wenjiang,Chen Shiqin. The Design of RSS 2.0 Generating and Parsing Class Library Based on LINQ[J]. 现代图书情报技术, 2009, 25(7-8): 131-135.
[15] Yin Jinling,Wang Huilin. Research on the Part-of-Speech Tagging Method[J]. 现代图书情报技术, 2009, 3(3): 46-51.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn