Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nathan Dimmock is active.

Publication


Featured researches published by Nathan Dimmock.


IEEE Pervasive Computing | 2003

Using trust for secure collaboration in uncertain environments

Vinny Cahill; Elizabeth Gray; Jean-Marc Seigneur; Christian Damsgaard Jensen; Yong Chen; Brian Shand; Nathan Dimmock; Andrew Twigg; Jean Bacon; Colin English; Waleed Wagealla; Sotirios Terzis; Paddy Nixon; G. Di Marzo Serugendo; Ciarán Bryce; M. Carbone; Karl Krukow; M. Nielson

The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.


symposium on access control models and technologies | 2004

Using trust and risk in role-based access control policies

Nathan Dimmock; András Belokosztolszki; David M. Eyers; Jean Bacon; Ken Moody

Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their credentials and intentions. Most distributed access control architectures have far more rigid policy rules, yet in many respects aim to solve a similar problem. This paper elucidates the similarities between trust management and distributed access control systems by demonstrating how the OASIS access control system and its rôle-based policy language can be extended to make decisions on the basis of trust and risk analyses rather than on the basis of credentials alone. We apply our new model to the prototypical example of a file storage and publication service for the Grid, and test it using our Prolog-based OASIS implementation.


international conference on trust management | 2005

Risk models for trust-based access Control(TBAC)

Nathan Dimmock; Jean Bacon; David Ingram; Ken Moody

The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illustrated by way of a collaborative spam detection application.


workshops on enabling technologies infrastracture for collaborative enterprises | 2003

How much is "enough"? Risk in trust-based access control

Nathan Dimmock

Trust-based access control is the idea of using a model of human notions of trust and community as the basis for assigning privileges. Risk analysis is used to determine how much trust is required to assign a particular privilege in trust-based access control. Other topics mentioned are the validation of the model, investigation of how continuous probability density functions may be reasoned about in resource constrained environments and the creation of a general purpose policy language to allow the specification of policies.


workshops on enabling technologies infrastracture for collaborative enterprises | 2003

Attack-resistance of computational trust models

Andrew Twigg; Nathan Dimmock

The World Wide Web encourages widely-distributed, open, decentralized systems that span multiple administrative domains. Recent research has turned to trust management according to M. Blaze et al. (1996) as a framework for decentralizing security decisions in such systems. However, while traditional security measures such as cryptography and encryption are well-understood (theoretically and empirically), the same cannot be said for computational trust models. This paper describes the attack-resistance of several well-referenced trust models, in a move toward a possible framework and terminology for such analyses. We present a number of open questions, and consider possible future directions in the area.


ACM Crossroads Student Magazine | 2004

Peer-to-peer collaborative spam detection

Nathan Dimmock; Ian Maddison

Although there are many potential solutions to spam, it oftenappears that filtering and blocking are the best. Unfortunately these techniques are inadequate, as evidencedby the continuing proliferation of spam. Here we describe a student project thatevolved collaborative filtering, previouslyimplemented using a centralized repository of spam information, intoa distributed, collaborative, peer-to-peer-based spam detection system.


international conference on trust management | 2005

Towards an evaluation methodology for computational trust systems

Ciarán Bryce; Nathan Dimmock; Karl Krukow; Jean-Marc Seigneur; Vinny Cahill; Waleed Wagealla

Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that define the measure of security of such models. This paper discusses the issues involved in evaluating these models, using the SECURE trust-based framework as a case study.


pervasive computing and communications | 2003

Trust for ubiquitous, transparent collaboration

Brian Shand; Nathan Dimmock; Jean Bacon


Archive | 2005

Using trust and risk for access control in Global Computing

Nathan Dimmock


Archive | 2004

Preliminary Definition of a Trust-based Access Control Model

Jean Bacon; Andrzej Luczak; Daniel Cvrček; Nathan Dimmock; David M. Eyers; David M. E. Ingram; Ken Moody

Collaboration


Dive into the Nathan Dimmock's collaboration.

Top Co-Authors

Avatar

Jean Bacon

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrew Twigg

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Waleed Wagealla

University of Strathclyde

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge