Evaluating Trust and Authenticity with Caution

  • Jacek Jonczy
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3986)


The purpose of this paper is to show how to use Caution, a tool for the specification and evaluation of credential networks. The resulting degrees of support and possibility allow to make decisions concerning the authenticity and/or trustworthiness of an unknown entity in an open network. The specification of a credential network and the subsequent computations will be illustrated by examples.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jonczy, J., Haenni, R.: Credential networks: a general model for distributed trust and authenticity management. In: Ghorbani, A., Marsh, S. (eds.) PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 101–112 (2005)Google Scholar
  2. 2.
    Haenni, R., Jonczy, J., Kohlas, R.: Two-layer models for managing authenticity and trust. In: Song, R., Korba, L., Yee, G. (eds.) Trust in E-Services: Technologies, Practices and Challenges (accepted, 2006)Google Scholar
  3. 3.
    Jonczy, J., Haenni, R.: Implementing credential networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 164–178. Springer, Heidelberg (accepted, 2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jacek Jonczy
    • 1
  1. 1.Institute of Computer Science and Applied MathematicsUniversity of BerneBerneSwitzerland

Personalised recommendations