12.12.2012 Views

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

30 I. Agudo, C. Fernandez-Gago, and J. Lopez<br />

Those implicit trust relations depend on the k<strong>in</strong>d of trust dependability that we allow<br />

<strong>in</strong> our system. The dependability rules have to be taken <strong>in</strong>to account when reduc<strong>in</strong>g the<br />

trust graph for a given task. The dependency among tasks that we use <strong>in</strong> this paper is<br />

<strong>in</strong>spired <strong>in</strong> the def<strong>in</strong>itions of the syntax of the RT framework, a family of Role-based<br />

Trust management languages for represent<strong>in</strong>g policies and credentials <strong>in</strong> distributed<br />

authorization [14]. In this work the authors def<strong>in</strong>e four different types of relationships<br />

among roles. If the relationships <strong>in</strong> the model are simple, these relationships can be<br />

modelled by us<strong>in</strong>g a partial order. This is the case for our purpose <strong>in</strong> this paper, a model<br />

of tasks, which are quite an objective concept. Next we will give some def<strong>in</strong>itions.<br />

Def<strong>in</strong>ition 1 (Trust Doma<strong>in</strong>). A trust doma<strong>in</strong> is a partially ordered set (TD,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!