Abstract
Trust and reputation models provide soft-security mechanisms that can be used to induce cooperative behaviors in user-centric communities in which user-generated services and resources are shared. The effectiveness of such models depends on several, orthogonal aspects that make their analysis a challenging issue. This paper aims to provide support to the design of trust and reputation infrastructures and to verify their adequacy in the setting of software architectures and computer networks underlying online communities. This is done by proposing a formal framework encompassing a calculus of concurrent systems, a temporal logic for trust, and model checking techniques.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Aldini, A.: Formal Approach to Design and Automatic Verification of Cooperation-Based Networks. Journal on Advances in Internet Technology 6, 42–56 (2013)
Aldini, A., Bogliolo, A.: Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications. In: Rawat, D., Bista, B., Yan, G. (eds.) Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, pp. 432–461. IGI Global (2014)
Aldini, A., Bernardo, M., Corradini, F.: A Process Algebraic Approach to Software Architecture Design. Springer (2010)
Aldini, A., Bernardo, M., Sproston, J.: Performability Measure Specification: Combining CSRL and MSL. In: Salaün, G., Schätz, B. (eds.) FMICS 2011. LNCS, vol. 6959, pp. 165–179. Springer, Heidelberg (2011)
Baier, C., Cloth, L., Haverkort, B., Hermanns, H., Katoen, J.-P.: Performability Assessment by Model Checking of Markov Reward Models. Formal Methods in System Design 36, 1–36 (2010)
Bogliolo, A., Polidori, P., Aldini, A., Moreira, W., Mendes, P., Yildiz, M., Ballester, C., Seigneur, J.-M.: Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks. In: Proc. 8th Wireless Communications and Mobile Computing Conf (IWCMC 2012), pp. 895–900. IEEE (2012)
Carbone, M., Nielsen, M., Sassone, V.: A Calculus for Trust Management. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol. 3328, pp. 161–173. Springer, Heidelberg (2004)
Chaki, S., Clarke, E.M., Ouaknine, J., Sharygina, N., Sinha, N.: State/Event-Based Software Model Checking. In: Boiten, E.A., Derrick, J., Smith, G.P. (eds.) IFM 2004. LNCS, vol. 2999, pp. 128–147. Springer, Heidelberg (2004)
Chen, T., Forejt, V., Kwiatkowska, M., Parker, D., Simaitis, A.: Automatic Verification of Competitive Stochastic Systems. Formal Methods in System Design 43(1), 61–92 (2013)
Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: An OpenSource Tool for Symbolic Model Checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 359–364. Springer, Heidelberg (2002)
Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic Verification of Finite State Concurrent Systems using Temporal Logic Specifications. ACM Transactions on Programming Languages and Systems 8(2), 244–263 (1986)
De Nicola, R., Vaandrager, F.W.: Actions versus State based Logics for Transition Systems. In: Guessarian, I. (ed.) LITP 1990. LNCS, vol. 469, pp. 407–419. Springer, Heidelberg (1990)
Huang, J., Nicol, D.: A Calculus of Trust and Its Application to PKI and Identity Management. In: Proc. 8th Symposium on Identity and Trust on the Internet (IDtrust 2009), pp. 23–37. ACM (2009)
Jøsang, A.: Trust and Reputation Systems. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 209–245. Springer, Heidelberg (2007)
Jøsang, A.: Subjective logic book, draft (2013), http://folk.uio.no/josang/papers/subjective_logic.pdf
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proc. 12th Conf. on World Wide Web (WWW 2003), pp. 640–651. ACM (2003)
Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: Verification of Probabilistic Real-Time Systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585–591. Springer, Heidelberg (2011)
Li, Z., Shen, H.: Game-Theoretic Analysis of Cooperation Incentives Strategies in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing (2012)
Martinelli, F.: Towards an Integrated Formal Analysis for Security and Trust. In: Steffen, M., Zavattaro, G. (eds.) FMOODS 2005. LNCS, vol. 3535, pp. 115–130. Springer, Heidelberg (2005)
Nielsen, M., Krukow, K.: Towards a formal notion of trust. In: Proc. 5th ACM SIGPLAN Conf. on Principles and Practice of Declaritive Programming (PPDP 2003), pp. 4–7 (2003)
ter Beek, M.H., Fantechi, A., Gnesi, S., Mazzanti, F.: An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications. In: Leue, S., Merino, P. (eds.) FMICS 2007. LNCS, vol. 4916, pp. 133–148. Springer, Heidelberg (2008)
Theodorakopoulos, G., Baras, J.S.: On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24, 318–328 (2006)
Zhang, Y., Lin, L., Huai, J.: Balancing Trust and Incentive in Peer-to-Peer Collaborative Systems. Journal of Network Security 5, 73–81 (2007)
Zhou, R., Hwang, K.: PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 460–473 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Aldini, A. (2014). A Calculus for Trust and Reputation Systems. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds) Trust Management VIII. IFIPTM 2014. IFIP Advances in Information and Communication Technology, vol 430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43813-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-43813-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43812-1
Online ISBN: 978-3-662-43813-8
eBook Packages: Computer ScienceComputer Science (R0)