Managing trust in an information-labeling system
نویسندگان
چکیده
Many network services need to make \trust management" decisions; in particular, processing users' requests for action often requires using labels and credentials that may not be authentic or trustworthy. In this paper, we address the problem of trust management in information labeling. The Platform for Internet Content Selection (PICS), proposed by Resnick and Miller 13], establishes a exible way to label documents according to various aspects of their contents, thus permitting a large and diverse group of potential viewers to make (automated) informed judgments about whether or not to view them. For some viewers, the relevant aspects may be quantity or quality of material in certain topical areas, and, for others, they may be the presence or absence of potentially ooensive language or images. Thus PICS users need a language in which to specify their PICS prooles, i.e., the aspects according to which they want documents to be labeled, the acceptable values of those labels, and the parties whom they trust to do the labeling. Furthermore, PICS-compliant client software (e.g., a web browser) needs a mechanism for checking whether a document meets the requirements set forth in a viewer's proole. A trust management solution for the PICS information-labeling system must provide both a language for specifying prooles and a mechanism for checking whether a document meets the requirements given in a proole. This paper describes our design and implementation of a PICS proole language and our experience integrating the PolicyMaker trust management engine with a PICS-compliant browser to provide a checking mechanism. PolicyMaker was originally designed to address trust management problems in network services that process signed requests for action and use public-key cryptography 2]. Because information labeling is not inherently a cryptographically based service, and thus is outside the original scope of the PolicyMaker framework, our work on information labeling is evidence of PolicyMaker's power and adaptability.
منابع مشابه
Information Architecture of Research Institutes’ Website, Case Study: Iranian Research Institute for Information Science and Technology’s Website
Purpose: As mission-oriented organizations, research institutes have the task of answering community questions in specialized areas, and should therefore be able to effectively present their outputs to their target users. Achieving such a goal requires the proper use of information architecture principles to properly organize the information platform in which the research institutes interact wi...
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کاملOn trust management in grids
This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management
متن کاملCloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming
The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- European Transactions on Telecommunications
دوره 8 شماره
صفحات -
تاریخ انتشار 1997