Towards Trust-Aware and Self-adaptive Systems

  • Francisco Moyano
  • Benoit Baudry
  • Javier Lopez
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 401)


The Future Internet (FI) comprises scenarios where many heterogeneous and dynamic entities must interact to provide services (e.g., sensors, mobile devices and information systems in smart city scenarios). The dynamic conditions under which FI applications must execute call for self-adaptive software to cope with unforeseeable changes in the application environment. Software engineering currently provides frameworks to develop reasoning engines that automatically take reconfiguration decisions and that support the runtime adaptation of distributed, heterogeneous applications. However, these frameworks have very limited support to address security concerns of these application, hindering their usage for FI scenarios. We address this challenge by enhancing self-adaptive systems with the concepts of trust and reputation. Trust will improve decision-making processes under risk and uncertainty, in turn improving security of self-adaptive FI applications. This paper presents an approach that includes a trust and reputation framework into a platform for adaptive, distributed component-based systems, thus providing software components with new abilities to include trust in their reasoning process.


  1. 1.
    Blair, G., Bencomo, N., France, R.B.: Models@ run.time. Computer 42(10), 22–27 (2009)CrossRefGoogle Scholar
  2. 2.
    Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, pp. 891–900. ACM, New York (2009)CrossRefGoogle Scholar
  3. 3.
    Crapanzano, C., Milazzo, F., De Paola, A., Re, G.L.: Reputation Management for Distributed Service-Oriented Architectures. In: 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop, SASOW, pp. 160–165 (2010)Google Scholar
  4. 4.
    Fouquet, F., Barais, O., Plouzeau, N., Jézéquel, J.-M., Morin, B., Fleurey, F.: A Dynamic Component Model for Cyber Physical Systems. In: 15th International ACM SIGSOFT Symposium on Component Based Software Engineering, Bertinoro, Italie (July 2012)Google Scholar
  5. 5.
    Gambetta, D.: Can we trust trust? In: Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)Google Scholar
  6. 6.
    Ghezzi, C.: The fading boundary between development time and run time. In: Zavattaro, G., Schreier, U., Pautasso, C. (eds.) ECOWS, p. 11. IEEE (2011)Google Scholar
  7. 7.
    Hanen, H., Bourcier, J.: Dependability-Driven Runtime Management of Service Oriented Architectures. In: PESOS - 4th International Workshop on Principles of Engineering Service-Oriented Systems, Zurich, Suisse (June 2012)Google Scholar
  8. 8.
    Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the Sixth IEEE Symposium on Computers and Communications, pp. 2–8 (2001)Google Scholar
  9. 9.
    Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 75–90. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  11. 11.
    Moyano, F., Fernandez-Gago, C., Lopez, J.: A conceptual framework for trust models. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 93–104. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    van Rooy, D., Bus, J.: Trust and privacy in the future internet - a research perspective. Identity in the Information Society 3(2), 397–404 (2010)CrossRefGoogle Scholar
  13. 13.
    Yan, Z., Prehofer, C.: Autonomic Trust Management for a Component-Based Software System. IEEE Transactions on Dependable and Secure Computing 8(6), 810–823 (2011)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Francisco Moyano
    • 1
  • Benoit Baudry
    • 2
    • 3
  • Javier Lopez
    • 1
  1. 1.Network, Information and Computer Security LabUniversity of MalagaMalagaSpain
  2. 2.INRIA Rennes Bretagne-AtlantiqueRennesFrance
  3. 3.Certus Software V&V Center, SIMULA RESEARCH LAB.LysakerNorway

Personalised recommendations