Abstract
It is easy enough to assert the trustworthiness or otherwise of a digital record, but it is far more difficult to present an objective basis for that assertion. A number of recent research efforts have focused on the trustworthiness of a digital record while paying scant attention to the record’s evidential value as a measure of and a basis for the assessment of its trustworthiness. In this work, we study a model for the assessment of the trustworthiness of digital records based on their evidential values using the Dempster-Shafer (D-S) theory. The model is divided into three modules, (i) a knowledge-modelling module that models expert knowledge and consequent belief of evidence, (ii) an evidence-combination module that combines evidence from different sources in the face of uncertainty, and (iii) a trustworthiness assessment module that aggregates and integrates evidence, and assesses its trustworthiness. An example is presented to show how the model works.
Chapter PDF
References
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 183–210. Springer, Heidelberg (1999)
Boudrez, F.: Digital singatures and electronic records. Archival Science 7(2), 179–193 (2007)
Center for Research Libraries: Trustworthy repositories audit & certification: Criteria and checklist (2008), http://www.crl.edu/PDF/trac.pdf
Chen, T.M., Venkataramanan, V.: Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing 9(6), 35–41 (2005)
Consultative Committee for Space Data Systems: Reference model for an open archival information system (OAIS) (2002)
Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics 38, 325–339 (1967)
Gladney, H.M.: Trustworthy 100-year digital objects: Evidence after every witness is dead. ACM Transaction on Information System (TOIS) 22(3), 406–436 (2004)
Gladney, H.M., Lorie, R.A.: Trustworthy 100-year digital objects: durable encoding for when it’s too late to ask. ACM TOIS 23(3), 299–324 (2005)
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4) (2000)
Grant, J.S., Davis, L.L.: Selection and use of content experts in instrument development. Research in Nursing & Health 20(3), 269–274 (1997)
Hu, D., Wang, L., Zhou, Y., Zhou, Y., Jiang, X., Ma, L.: D-S evidence theory based digital image trustworthiness evaluation model. In: MINES 2009 (2009)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003, pp. 640–651 (2003)
Kohlas, J., Monney, P.A.: Theory of evidence - a survey of its mathematical foundations, applications and computational aspects. Mathematical Methods of Operations Research 39(1), 35–68 (1994)
Lynn, M.: Determination and quantification of content validity. Nursing Research 35(6), 382 (1986)
Ma, J., Abie, H., Skramstad, T., Nygård, M.: Development and validation of requirements for evidential value for assessing trustworthiness of digital records over time. Journal of Information (to appear, 2011)
Menezes, A., Oorschot, P., Vanstone, S. (eds.) Handbook of applied cryptography (1996)
National Archives of Australia: Australian government recordkeeping metadata standard. Tech. rep (2008)
Rescorla, E.: SSL and TLS: Designing and building secure systems. Addison-Wesley Professional, Reading (2000)
Sentz, K., Ferson, S.: Combination of evidence in dempster-shafer theory. Tech. rep. (2002)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Sun, Y.L., Han, Z., Yu, W., Liu, K.: Attacks on trust evaluation in distributed networks. In: CISS 2006, pp. 1461–1466 (2006)
Trcek, D.: A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modelling 49(1-2), 226–233 (2009)
Zadeh, L.A.: A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination. AI Magazine 7(2), 85–90 (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 International Federation for Information Processing
About this paper
Cite this paper
Ma, J., Abie, H., Skramstad, T., Nygård, M. (2011). Assessment of the Trustworthiness of Digital Records. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds) Trust Management V. IFIPTM 2011. IFIP Advances in Information and Communication Technology, vol 358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22200-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-22200-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22199-6
Online ISBN: 978-3-642-22200-9
eBook Packages: Computer ScienceComputer Science (R0)