Skip to main content

Towards an Evaluation Methodology for Computational Trust Systems

  • Conference paper
Trust Management (iTrust 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3477))

Included in the following conference series:

Abstract

Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that define the measure of security of such models. This paper discusses the issues involved in evaluating these models, using the SECURE trust-based framework as a case study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Spamassassin, http://spamassassin.apache.org

  2. Anderson, R.J.: Security Engineering — A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2001)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. Technical Report 96-17, DIMACS, June 28 (1996)

    Google Scholar 

  4. Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive 2(3), 52–61 (2003)

    Article  Google Scholar 

  5. Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Trust-based access control model. EU IST-FET SECURE Project Deliverable (September 2004)

    Google Scholar 

  6. Douceur, J.R., Donath, J.S.: The Sybil Attack, February 22 (2002)

    Google Scholar 

  7. Garcia-Molina, H., Schlosser, M.T., Kamvar, S.D.: The EigenTrust Algorithm for Reputation Management in P2P Networks, November 18 (2002)

    Google Scholar 

  8. Gong, L.: Inside Java 2 Platform Security. The Java Series. Addison Wesley, Reading (1999)

    Google Scholar 

  9. Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human Experiments in Trust Dynamics. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 206–220. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Kindberg, T., Sellen, A., Geelhoed, E.: Security and Trust in Mobile Interactions: A Study of Users’ Perceptions and Reasoning. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 196–213. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Lampson, B., Rivest, R.L.: SDSI – A Simple Distributed Security Infrastructure. Technical report, July 26 (1996)

    Google Scholar 

  12. Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Massa, P., Bhattacharjee, B.: Using Trust in Recommender Systems: an Experimental Analysis. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Seigneur, J.-M., Dimmock, N., Bryce, C., Jensen, C.: Combating SPAM with Trustworthy Email Addresses. In: Proceedings of the 2nd International Conference on Privacy, Security and Trust, New Brunswick, June 9-19, pp. 228–229. ACM Press, New York (2004)

    Google Scholar 

  15. Seigneur, J.-M., Jensen, C.D.: Privacy Recovery with Disposable Email Addresses. IEEE Security & Privacy 1(6), 35–39 (2003)

    Article  Google Scholar 

  16. Twigg, A., Dimmock, N.: Attack Resistance of Computational Trust Models. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises — Enterprise Security, June 2003, pp. 281–282 (2003)

    Google Scholar 

  17. Wagealla, W., Terzis, S., English, C., Nixon, P.: Simulation-based Assessment and Validation for the SECURE Collaboration Model. Technical report, University of Strathcylde (2005)

    Google Scholar 

  18. Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer Ecommerce Communities. In: Proceedings of the 4th ACM Conference on Electronic Commerce EC 2003, June 9-12, pp. 228–229. ACM Press, New York (2003)

    Chapter  Google Scholar 

  19. Zannone, N.: A Survey on Trust Management Languages. Technical report, University of Verona, August 01 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bryce, C., Dimmock, N., Krukow, K., Seigneur, JM., Cahill, V., Wagealla, W. (2005). Towards an Evaluation Methodology for Computational Trust Systems. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_20

Download citation

  • DOI: https://doi.org/10.1007/11429760_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26042-4

  • Online ISBN: 978-3-540-32040-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics