Evaluating Trust and Authenticity with Caution
The purpose of this paper is to show how to use Caution, a tool for the specification and evaluation of credential networks. The resulting degrees of support and possibility allow to make decisions concerning the authenticity and/or trustworthiness of an unknown entity in an open network. The specification of a credential network and the subsequent computations will be illustrated by examples.
Unable to display preview. Download preview PDF.
- 1.Jonczy, J., Haenni, R.: Credential networks: a general model for distributed trust and authenticity management. In: Ghorbani, A., Marsh, S. (eds.) PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 101–112 (2005)Google Scholar
- 2.Haenni, R., Jonczy, J., Kohlas, R.: Two-layer models for managing authenticity and trust. In: Song, R., Korba, L., Yee, G. (eds.) Trust in E-Services: Technologies, Practices and Challenges (accepted, 2006)Google Scholar