VTrust: A Trust Management System Based on a Vector Model of Trust

  • Indrajit Ray
  • Sudip Chakraborty
  • Indrakshi Ray
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3803)


Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the problem of trust management using the vector model. We develop a new trust management engine which we call VTrust (from Vector Trust). The trust management engine stores and manages current as well as historical information about different parameters that define a trust relation between a truster and a trustee. We propose an SQL like language called TrustQL to interact with the trust management engine. TrustQL consists of a Trust Definition Language (TDL) that is used to define a trust relationship and a Trust Manipulation Language (TML) that is used to query and update information about trust relationships.


Trust Relationship Vector Model Trust Management Structure Query Language Experience Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ray, I., Chakraborty, S.: A vector model of trust for developing trustworthy systems. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 260–275. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The keynote trust management system (version 2) (1999),
  3. 3.
    Grandison, T.: Trust Specification and Analysis for Internet Applications. PhD thesis, Imperial College of Science Technology and Medicine, Department of Computing, London, UK (2001)Google Scholar
  4. 4.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of 17th IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the policymaker trust management system. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254–274. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Herzberg, A., Mass, Y., Mihaeli, J., Naor, O., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: Proceedings of IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 2–15. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
  7. 7.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 2–16 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Indrajit Ray
    • 1
  • Sudip Chakraborty
    • 1
  • Indrakshi Ray
    • 1
  1. 1.Computer Science DepartmentColorado State UniversityFort CollinsUSA

Personalised recommendations