A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade

  • Theo Dimitrakos
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 374)

Abstract

Year 2012 completes a decade since the iTrust research network was established in Europe. The international research community associated with iTrust is the predecessor of the IFIP Working Group 11.11 on Trust Management, the organization largely behind events such as the IFIPTM conference series. The completion of a decade since the establishment of iTrust also marks the first time that an international conference on Trust Management takes place in India, and indeed the first time that such a conference takes place outside of the aging “old world” economies of Europe, North America and Japan. This combination offers an excellent opportunity for a review of how we got here: the evolution of the international research community on trust management from 2002 to 2012. This review also offers a pre-text for surveying a selection of research results, research papers and innovative solution demonstrators that have been produce by the trust management community in the last decade.

This paper is the printed version of an invited keynote in IFIPTM 2012 conference that took place in Surat, India.

References

  1. 1.
    Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, electronic edn., Department of Sociology, pp. 213–237. University of Oxford (1998), http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
  2. 2.
    McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center (1996), http://misrc.umn.edu/wpaper/
  3. 3.
    March, S.P.: Formalising Trust as a Computational Concept. In: Computing Science and Mathematics, p. 170. University of Stirling (1994)Google Scholar
  4. 4.
    Jøsang, A.: Artificial Reasoning with Subjective Logic. In: 2nd Australian Workshop on Commonsense Reasoning (1997), http://www.idt.ntnu.no/~ajos/papers.html
  5. 5.
    Jøsang, A.: A Subjective Metric of Authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 329–344. Springer, Heidelberg (1998), http://www.idt.ntnu.no/~ajos/papers.html CrossRefGoogle Scholar
  6. 6.
    Jøsang, A.: The right type of trust for distributed systems. In: ACM New Security Paradigms Workshop (1996), http://www.idt.ntnu.no/~ajos/papers.html
  7. 7.
    Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetGoogle Scholar
  8. 8.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Conference on Security and Privacy, Oakland, California, USA (1996), http://www.crypto.com/papers/policymaker.pdf
  9. 9.
    Blaze, M., Ioannidis, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System: Applications and Future Directions. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 284–300. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Anderson, S., et al.: Web Services Trust Language (WS-Trust) (2005), http://specs.xmlsoap.org/ws/2005/02/trust/WS-Trust.pdf
  11. 11.
    Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials 3, 2–16 (2000)CrossRefGoogle Scholar
  12. 12.
    Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2) (2007)Google Scholar
  14. 14.
    Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 93–107. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Willoughby, J.: “Burning Up”, article in Barrons magazine, March 20 (2000) Google Scholar
  16. 16.
    Dimitrakos, T.: System Models, e-Risks and e-Trust. In: I3E 2001, pp. 45–58 (2001) Google Scholar
  17. 17.
    Dimitrakos, T.: A Service-Oriented Trust Management Framework. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002 Ws Trust, Reputation... LNCS (LNAI), vol. 2631, pp. 53–72. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  18. 18.
    Grandison, T., Sloman, M.: Specifying and Analysing Trust for Internet Applications. In: Proceedings of the 2nd IFIP Conference on e-Commerce, e-Business and e-Government (I3E 2002), Lisbon (2002)Google Scholar
  19. 19.
    Maibaum, T.S.E.: How Do I Trust Thee? Let Me Count The Ways. In: IEEE ICCI 2002, p. 23 (2002)Google Scholar
  20. 20.
    Jones, A.J.I., Firozabadi, B.: On the characterisation of a trusting agent - aspects of a formal approach. In: Castelfranchi, C., et al. (eds.) Trust and Deception in Virtual Societies, pp. 157–168. Kluwer Academic Publishers, Dordrecht (2001)Google Scholar
  21. 21.
    Falcone, R., Castelfranchi, C.: The Socio-Cognitive Dynamics of Trust: Does Trust Create Trust? In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) Trust in Cyber-societies. LNCS (LNAI), vol. 2246, pp. 55–72. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  22. 22.
    Castelfranchi, C., Falcone, R.: Trust is Much More Than Subjective Probability: Mental Components and Sources of Trust. In: HICSS 2000 (2000)Google Scholar
  23. 23.
    Jones, S., Wilikens, M., Morris, P., Masera, M.: Trust Requirements in E-Business: A Conceptual Framework. Communications of the ACM 43 (December 2000)Google Scholar
  24. 24.
    Dimitrakos, T., Raptis, D., Ritchie, B., Stølen, K.: Model Based Security Risk Analysis for Web Applications. In: EuroWeb 2002, Workshops in Computing BCS 2002 (2002)Google Scholar
  25. 25.
    Fredriksen, R., Kristiansen, M., Gran, B.A., Stølen, K., Opperud, T.A., Dimitrakos, T.: The CORAS Framework for a Model-Based Risk Management Process. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol. 2434, pp. 94–105. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  26. 26.
    Nixon, P., Terzis, S. (eds.): iTrust 2003. LNCS, vol. 2692. Springer, Heidelberg (2003)MATHGoogle Scholar
  27. 27.
    Jensen, C., Poslad, S., Dimitrakos, T. (eds.): iTrust 2004. LNCS, vol. 2995. Springer, Heidelberg (2004)MATHGoogle Scholar
  28. 28.
    Dimitrakos, T., Golby, D., Kearney, P.: Towards a Trust and Contract Management Framework for Dynamic Virtual Organisations. In: eAdoption and the Knowledge Economy: eChallenges 2004 (2004)Google Scholar
  29. 29.
    Herrmann, P., Issarny, V., Shiu, S. (eds.): iTrust 2005. LNCS, vol. 3477. Springer, Heidelberg (2005)Google Scholar
  30. 30.
    Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.): iTrust 2006. LNCS, vol. 3986. Springer, Heidelberg (2006)Google Scholar
  31. 31.
    Dimitrakos, T., Martinelli, F.: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, Toulouse, France, August 22-27, 2004. Springer (2005)Google Scholar
  32. 32.
    Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.): FAST 2005. LNCS, vol. 3866. Springer, Heidelberg (2006)Google Scholar
  33. 33.
    Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.): FAST 2006. LNCS, vol. 4691. Springer, Heidelberg (2007)Google Scholar
  34. 34.
    Degano, P., Guttman, J., Martinelli, F. (eds.): FAST 2008. LNCS, vol. 5491. Springer, Heidelberg (2009)Google Scholar
  35. 35.
    Etalle, S., Marsh, S. (eds.): Trust Management. IFIP, vol. 238. Springer, Boston (2007)Google Scholar
  36. 36.
    Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C.D. (eds.): Trust Management II. IFIP, vol. 263. Springer, Boston (2008)Google Scholar
  37. 37.
    Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.): IFIPTM 2009. IFIP AICT, vol. 300. Springer, Heidelberg (2009)Google Scholar
  38. 38.
    Nishigaki, M., Jøsang, A., Murayama, Y., Marsh, S. (eds.): IFIPTM 2010. IFIP AICT, vol. 321. Springer, Heidelberg (2010)MATHGoogle Scholar
  39. 39.
    Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.): IFIPTM 2011. IFIP AICT, vol. 358. Springer, Heidelberg (2011)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Theo Dimitrakos
    • 1
  1. 1.Security Futures PracticeBT Research & TechnologyUK

Personalised recommendations