Trust Management Support for Context-Aware Service Platforms

  • Ricardo Neisse
  • Maarten Wegdam
  • Marten van Sinderen
Part of the Lecture Notes in Social Networks book series (LNSN)


High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers of context-aware services in managing the trade-off between privacy protection and context-based service adaptation. We applied our trust management model in two trust-based selection mechanisms. The first trust-based selection mechanism support users of context-aware services in selecting trustworthy service providers to interact with. This mechanism supports the users in the selection process, taking into account the users’ goals, trust beliefs, and the trust dependencies between the service users and the entities that collaborate in the context-aware service provisioning. The second trust-based selection mechanism supports context-aware service providers in selecting trustworthy context providers taking into account the trustworthiness of the context providers to provide context information about a specific user and quality level. To conclude this chapter we present the evaluation of the technical feasibility of our trust management model in trust-based selection mechanisms through a prototype implementation.


Trust management Context-aware Subjective logic 


  1. 1.
    Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: HICSS’00: Proceedings of the 33rd Hawaii international conference on system sciences, vol 6. IEEE Computer Society, Washington, USA, p 6007Google Scholar
  2. 2.
    Almenárez F, Marín A, Campo C, García CR (2004) A pervasive trust management model for dynamic open environments. In: First workshop on pervasive security and trust in mobiQuitous 2004, Boston, USAGoogle Scholar
  3. 3.
    Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106CrossRefGoogle Scholar
  4. 4.
    Daskapan S, Ali Eldin A, Wagenaar R (2005) Trust in mobile context aware systems. In: International business information management conference (5th IBIMA), Dec 2005, Cairo, EgyptGoogle Scholar
  5. 5.
    Dockhorn Costa P (2007) Architectural support for context-aware applications: from context models to services platforms. PhD thesis, University of Twente, December 2007Google Scholar
  6. 6.
    Grandison T, Sloman M (2000) A survey of trust in internet application.
  7. 7.
    Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: PERCOMW’05: Proceedings of the third IEEE international conference on pervasive computing and communications workshops. IEEE Computer Society, Washington, USA, pp 120–124Google Scholar
  8. 8.
    Huebscher C, Mccann A (2005) An adaptive middleware framework for context-aware applications. Personal Ubiquitous Computing 10(1):12–20Google Scholar
  9. 9.
    Hulsebosch RJ, Salden AH, Bargh MS, Ebben PWG, Reitsma J (2005) Context sensitive access control. In: SACMAT’05: Proceedings of the tenth ACM symposium on access control models and technologies. ACM, New York, USA, pp 111–119Google Scholar
  10. 10.
    Jøsang A (1996) The right type of trust for distributed systems. In: NSPW’96: Proceedings of the 1996 workshop on new security paradigms, pp 119–131Google Scholar
  11. 11.
    Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertainty Fuzziness Knowl Based Syst 9(3):279–311Google Scholar
  12. 12.
    Jøsang A (2010) Evidential reasoning with subjective logic. In: 13th international conference on information fusion 2010Google Scholar
  13. 13.
    Jøsang A (2010) Subjective logic book (draft).
  14. 14.
    Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: ACSC’06: Proceedings of the 29th Australasian computer science conference. Australian Computer Society Inc., Darlinghurst, Australia, pp 85–94Google Scholar
  15. 15.
    Jøsang A, Keser C, Dimitrakos T (2005) Can we manage trust? In: iTrust 2005, trust management, third international conference. Paris, France, pp 93–107Google Scholar
  16. 16.
    Kantara Initiative (2013) Identity assurance framework.
  17. 17.
    Lachmund S, Walter T, Gomez L, Bussard L, Olk E (2006) Context-aware access control making access control decisions based on context information. In: 3rd annual international conference on mobile and ubiquitous systems—workshops, July 2006, pp 1–8Google Scholar
  18. 18.
    Li W, Kilander F, Jansson CG (2006) Toward a person-centric context aware system. In: Workshop on requirements and solutions for pervasive software infrastructures, PERVASIVE, 2006Google Scholar
  19. 19.
    Mayer RC, Davis JH, Schoorman DF (1995) An integrative model of organizational trust. The Acad Manage Rev 20(3):709–734Google Scholar
  20. 20.
    Mcknight DH, Chervany NL (1996) The meanings of trust.
  21. 21.
    Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, University of Twente, March 2012Google Scholar
  22. 22.
    Neisse R, Doerr J (2013) Model-based specification and refinement of usage control policies. In: Eleventh international conference on privacy, security and trust (PST), 2013Google Scholar
  23. 23.
    Neisse R, Holling D, Pretschner A (2011) Implementing trust in cloud infrastructures. In: Proceedings of the 11th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), 2011Google Scholar
  24. 24.
    Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: Proceedings of the 2008 international symposium on trusted computing (TrustCom), Nov 2008Google Scholar
  25. 25.
    Neisse R, Wegdam M, van Sinderen M, Lenzini G (2007) Trust management model and architecture for context-aware service platforms. In: Proceedings of the 2nd international symposium on information security (IS07), Nov 26–27. Vilamoura, Portugal, pp 1803–1820Google Scholar
  26. 26.
    Nielsen M, Krukow K (2003) Towards a formal notion of trust. In: PPDP’03: Proceedings of the 5th ACM SIGPLAN international conference on principles and practice of declarative programming. ACM, New York, USA, pp 4–7Google Scholar
  27. 27.
    Pons AP (2006) Biometric marketing: targeting the online consumer. Commun ACM 49(8):60–66CrossRefGoogle Scholar
  28. 28.
    Pranam K, Li D, Lalana K, Shashidhara G, Anupam J, Tim J (2004) Enhancing P3P framework through policies and trust. Technical report, UMBCGoogle Scholar
  29. 29.
    Quinn K, Lewis D, O’Sullivan D, Wade VP (2006) Trust meta-policies for flexible and dynamic policy based trust management. In: POLICY’06: proceedings of the seventh IEEE international workshop on policies for distributed systems and networks (POLICY’06). IEEE Computer Society, Washington, USA, pp 145–148Google Scholar
  30. 30.
    Toivonen S, Lenzini G, Uusitalo I (2006) Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of the WWW’06 workshop on models of trust for the web (MTW’06), Edinburgh, ScotlandGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ricardo Neisse
    • 1
  • Maarten Wegdam
    • 2
  • Marten van Sinderen
    • 3
  1. 1.European Commission Joint Research Center (JRC)IspraItaly
  2. 2.InnoValorEnschedeThe Netherlands
  3. 3.Centre for Telematics and Information Technology (CTIT)University of TwenteEnschedeThe Netherlands

Personalised recommendations