Main Reference PaperA Flexible Approach to Multi-session Trust Negotiations, Transactions on Dependable and Secure Computing, Jan 2012
  • Current real applications require flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this project, we introduce a novel approach to trust negotiations that offers a general solution to those issues by developing major extensions to previous approaches by presenting a multisession dependable approach to trust negotiations.

+ Description
  • Current real applications require flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this project, we introduce a novel approach to trust negotiations that offers a general solution to those issues by developing major extensions to previous approaches by presenting a multisession dependable approach to trust negotiations.

  • To design the protocols that must be able to adapt to context changes and be dependable.

  • To design a long lasting trust negotiation that should successfully withstand suspensions and interruptions.

  • To allow the negotiators to switch roles while the negotiation is ongoing, so to guarantee dependability, when contextual conditions, such as availability of resources and peers

+ Aim & Objectives
  • To design the protocols that must be able to adapt to context changes and be dependable.

  • To design a long lasting trust negotiation that should successfully withstand suspensions and interruptions.

  • To allow the negotiators to switch roles while the negotiation is ongoing, so to guarantee dependability, when contextual conditions, such as availability of resources and peers

  • The contribution is to formalize the following intuition about safe enforcement of ack policies: unless N’s negotiation opponent satisfies the ack policy for a sensitive attribute, N’s behavior in the negotiation must give no indication of whether N possesses any credentials documenting the sensitive attribute.

+ Contribution
  • The contribution is to formalize the following intuition about safe enforcement of ack policies: unless N’s negotiation opponent satisfies the ack policy for a sensitive attribute, N’s behavior in the negotiation must give no indication of whether N possesses any credentials documenting the sensitive attribute.

  • Java JDK 1.8, MySQL 5.5.40

  • J2SE , JXTA protocol

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • J2SE , JXTA protocol

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.