Towards trust management standardization (original) (raw)

A Survey of Trust in Internet Applications

IEEE Communications Surveys & Tutorials, 2000

The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document and are linked to publications on ResearchGate, letting you access and read them immediately.

Towards a formal notion of trust

Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming - PPDP '03, 2003

Trust management systems have been proposed as an alternative to traditional security mechanisms in Global Computing. We present some challenges in establishing a formal foundation for the notion of trust, and some preliminary ideas towards a category of trust models.

Towards a dynamic and composable model of trust

Symposium on Access Control Models and Technologies, 2009

During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area.

A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S

2000

nternet services are increasingly being used in daily life for electronic commerce, Web-based access to information, and interpersonal interactions via electronic mail rather than voice or face-to-face, but there is still major concern about the trustworthiness of these services. There are no accepted techniques or tools for specification and reasoning about trust. There is a need for a high-level, abstract way of specifying and managing trust, which can be easily integrated into applications and used on any platform. Typical applications requiring a formal trust specification include content selection for Web documents [1], medical systems [2], telecom-muting [3], mobile code and mobile computing [4–6], as well as electronic commerce [7–14]. Our main motivation in studying trust specification and management is to use this as the starting point for subsequent refinement into security policies related to authorization and management of security [15]. However, there are additional rea...

Using Trust on the Internet

2009

— Trust is a concept we heavily use in everyday life because it allows us to cope with the complexity of interactions with other people. This concept is also implicitly used throughout the Internet, both in the infrastructure and in the end-user services. Since security problems on the Internet are becoming more and more serious, and thus present a threat to the further growth of the Internet, there is ongoing research that tries to turn trust into the first class component of the Internet architecture. In this paper we review concept of a trust and we give short review of the security problems on the Internet. We argue that those problems are fundamental in nature and, using current mechanisms, will never be solved appropriately. As a potential solution to this problem we discuss architecture modifications, related protocols and procedures that would allow trust to be an explicit part of the Internet. The goal of this paper is to form a base for further research on the trust issues...

AN EXPLICIT TRUST MODEL TOWARDS BETTER SYSTEM SECURITY

Trust is an absolute necessity for digital communications; but is often viewed as an implicit singular entity. The use of the internet as the primary vehicle for information exchange has made accountability and verifiability of system code almost obsolete. This paper proposes a novel approach towards enforcing system security by requiring the explicit definition of trust for all operating code. By identifying the various classes and levels of trust required within a computing system; trust is defined as a combination of individual characteristics. Trust is then represented as a calculable metric obtained through the collective enforcement of each of these characteristics to varying degrees. System Security is achieved by facilitating trust to be a constantly evolving aspect for each operating code segment capable of getting stronger or weaker over time.

A Formal Model for Trust Lifecycle Management

2000

The rapid development of collaborative environments over the internet has highlighted new concerns over security and trust in such global computing systems. The global computing infrastructure poses an issue of uncertainty about the potential collaborators. Reaching a trusting decision in such environments encompasses both risk and trust assessments. While much work has been done in terms of modelling trust, the

An Intensional Functional Model of Trust

IFIP – The International Federation for Information Processing

Computers have been in use for many years to build high confidence systems in safety-critical domains such as aircraft control, space transportation and exploration, and nuclear power plant management. However, due to the recent rush in developing ubiquitous and pervasive computing applications and a demand from across the world to access information from shared sources, the mosaic of computing ecosystem has undergone a radical change. It is in this context that computing has to be made trustworthy. To build and manage a trustworthy system it is necessary to blend and harmonize socially acceptable and technically feasible norms of trust. This in turn requires a generic formal model in which trust categories can be specified, trusted communication can be enabled, and trustworthy transactions can be specified and reasoned about. In this paper we introduce a formal intensional model of trust and suggest how it can be integrated into a trust management system.

A Study based on the Trust Management

International Journal of Computer Applications, 2013

Trust plays a vital role in human life. It is the key to the door of other people's minds. It cannot be judge easily. The user may trust on an insecure channel for communication of sensitive information which may get leaked. In multimedia the authentication and authorization is related with Trust management. Applications where a more dynamic trust management is advantageous may have a quickly varying user base. It is important for user to deal with the uncertainty regarding the future and their interaction partners. The trust management system can be used for signature verification, semantic web, and for social networks. This paper discussed about different methods of trust management system.

Defining Trust and E-trust: Old Theories and New Problems

The paper provides a selective analysis of the main theories of trust and e-trust (that is, trust in digital environments) provided in the last twenty years, with the goal of preparing the ground for a new philosophical approach to solve the problems facing them. It is divided into two parts. The first part is functional toward the analysis of e-trust: it focuses on trust and its definition and foundation and describes the general background on which the analysis of e-trust rests. The second part focuses on e-trust, its foundation and ethical implications. The paper ends by synthesising the analysis of the two parts.