Skip to main content

Trust Management Survey

  • Conference paper
Trust Management (iTrust 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3477))

Included in the following conference series:

Abstract

Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in computer-assisted collaboration and electronic commerce in particular. A computational model of trust and its implementation can alleviate this problem.

This survey is directed to an audience wishing to familiarize themselves with the field, for example to locate a research target or implement a trust management system. It concentrates on providing a general overview of the state of the art, combined with examples of things to take into consideration both when modelling trust in general and building a solution for a certain phase in trust management, be it trust relationship initialization, updating trust based on experience or determining what trust should have an effect on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kutvonen, L., Viljanen, L., Ruohomaa, S.: The TuBE approach to trust management in collaborative enterprise systems (2005) (manuscript)

    Google Scholar 

  2. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), vol. 7. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  3. Fogg, B., Soohoo, C., Danielson, D., Marable, L., Stanford, J., Tauber, E.R.: How do people evaluate a web site’s credibility? Technical report, Stanford Persuasive Technology Lab (2002)

    Google Scholar 

  4. Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human experiments in trust dynamics. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 206–220. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)

    Google Scholar 

  6. Baldwin, A., Shiu, S.: Hardware security appliances for trust. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 46–58. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Djordjevic, I., Dimitrakos, T.: Towards dynamic security perimeters for virtual collaborative networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 191–205. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Mayer, R.C., Davis, J.H.: An integrative model of organizational trust. The Academy of Management Review 20, 709–734 (1995)

    Article  Google Scholar 

  9. Jøsang, A., Presti, S.L.: Analysing the relationship between risk and trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. English, C., Terzis, S., Wagealla, W.: Engineering trust based collaborations in a global computing environment. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 120–134. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Brændeland, G., Stølen, K.: Using risk analysis to assess user trust - a net-bank scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 146–160. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Egger, F.N.: From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce. PhD thesis, Eindhoven University of Technology (2003)

    Google Scholar 

  13. Grimsley, M., Meehan, A., Tan, A.: Managing Internet-mediated community trust relations. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 277–290. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Ishaya, T., Mundy, D.P.: Trust development and management in virtual communities. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 266–276. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Gordijn, J., Akkermans, H.: Designing and evaluating e-Business models. IEEE Intelligent Systems 16, 11–17 (2001)

    Article  Google Scholar 

  16. Tan, Y.H., Thoen, W., Gordijn, J.: Modeling controls for dynamic value exchanges in virtual organizations. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 236–250. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, DISCEX 2000. Proceedings, vol. 1, pp. 88–102. IEEE, Los Alamitos (2000)

    Chapter  Google Scholar 

  18. Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems 29, 953–964 (1997)

    Article  Google Scholar 

  19. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos (1996)

    Google Scholar 

  20. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  21. Grandison, T., Sloman, M.: Specifying and analysing trust for Internet applications. In: Proceedings of 2nd IFIP Conference on e-Commerce, e-Business, e-Government I3e 2002, Lisbon, Portugal (2002)

    Google Scholar 

  22. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 18–38. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 419–437. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  24. Uszok, A., Bradshaw, J.M., Jeffers, R.: KAoS: A policy and domain services framework for grid computing and Semantic Web services. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 16–26. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  25. Bradshaw, J.M.: KAoS: An open agent architecture supporting reuse, interoperability, and extensibility. In: Proceedings of Tenth Knowledge Acquisition for Knowledge-Based Systems Workshop (1995)

    Google Scholar 

  26. Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 63–74. IEEE, Los Alamitos (2003)

    Chapter  Google Scholar 

  27. Firozabadi, B.S., Sergot, M.: Revocation in the privilege calculus. In: Workshop on Formal Aspects of Security and Trust (FAST2003) at FM 2003, vol. IIT TR-10/2003, IIT-CNR, Italy (2003) 39–51, http://www.iit.cnr.it/FAST2003/fast-proc-final.pdf (TR-10/2003)

  28. Rissanen, E.: Server based application level authorisation for Rotor. IEE Proceedings Software 150, 291–295 (2003)

    Article  Google Scholar 

  29. Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials 3, 2–16 (2000)

    Article  Google Scholar 

  30. Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P.: A formal model on trust lifecycle management. In: Workshop on Formal Aspects of Security and Trust (FAST2003) at FM 2003, vol. IIT TR-10, IIT-CNR, Italy, pp. 184–195 (2003) (TR-10/2003), http://www.iit.cnr.it/FAST2003/fast-proc-final.pdf

  31. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43, 45–48 (2000)

    Article  Google Scholar 

  32. Gray, E., Seigneur, J.M., Chen, Y., Jensen, C.: Trust propagation in small worlds. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 239–254. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  33. Jøsang, A., Hird, S., Faccer, E.: Simulating the effect of reputation systems on e-markets. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 179–194. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  34. Barber, K.S., Fullam, K., Kim, J.: Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 8–14. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  35. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference on System Sciences 33, HICSS (2000)

    Google Scholar 

  36. Essin, D.J.: Patterns of trust and policy. In: Proceedings of 1997 New Security Paradigms Workshop. ACM Press, New York (1997)

    Google Scholar 

  37. Gambetta, D.: Can we trust trust? Trust: Making and Breaking Cooperative Relations, Electronic edn., pp. 213–237 (2000)

    Google Scholar 

  38. Demolombe, R.: Reasoning about trust: A formal logical framework. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 291–303. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  39. Jøsang, A.: The right type of trust for computer networks. In: Proceedings of the ACM New Security Paradigms Workshop. ACM, New York (1996)

    Google Scholar 

  40. Egger, F.N.: Trust me, I’m an online vendor: Towards a model of trust for e-Commerce system design. In: Conference on Human Factors in Computing Systems, CHI 2000 extended abstracts on Human factors in computing systems. ACM Press, New York (2000)

    Google Scholar 

  41. Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. Pervasive Computing 2, 52–61 (2003)

    Article  Google Scholar 

  42. Kutvonen, L.: Automated management of inter-organisational applications. In: Proceedings of the Sixth International Enterprise Distributed Object Computing Conference (EDOC 2002), pp. 27–38 (2002)

    Google Scholar 

  43. Tan, Y.H.: A trust matrix model for electronic commerce. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 33–45. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  44. Obreiter, P.: A case for evidence-aware distributed reputation systems overcoming the limitations of plausibility considerations. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 33–47. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  45. Fernandes, A., Kotsovinos, E., östring, S., Dragovic, B.: Pinocchio: Incentives for honest participation in distributed trust management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 63–77. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  46. Kalcklösch, R., Herrmann, K.: Statistical trustability (conceptual work). In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 271–274. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  47. Kaler, C., Nadalin, A., et al.: Web Services Trust Language (WS-Trust), Version 1.1 (2004)

    Google Scholar 

  48. Karabulut, Y.: Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 318–331. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  49. Zamboni, D.: Using Internal Sensors for Computer Intrusion Detection. PhD thesis, Purdue University (2001)

    Google Scholar 

  50. Teng, H.S., Chen, K., Lu, S.C.Y.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: 1990 IEEE Symposium on Research in Security and Privacy, May 7–9, pp. 278–284. IEEE Computer Society, Los Alamitos (1990)

    Chapter  Google Scholar 

  51. Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for Unix processes. In: 1996 IEEE Symposium on Security and Privacy, Oakland, California, May 6–8 (1996)

    Google Scholar 

  52. Kumar, S., Spafford, E.H.: A Pattern Matching Model for Misuse Intrusion Detection. In: Proceedings of the 17th National Computer Security Conference, Baltimore, Maryland, October 1994, pp. 11–21 (1994)

    Google Scholar 

  53. Denning, D.: An intrusion-detection model. IEEE Transactions on Software Engineering 13, 222–232 (1987)

    Article  Google Scholar 

  54. Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S.: Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 265–274 (2002)

    Google Scholar 

  55. Chinnici, R., Gudgin, M., Moreau, J.J., Schlimmer, J., Weerawarana, S.: Web Services Description Language (WSDL) version 2.0 part 1: Core language, W3C working draft 10 November 2003. Technical report, World Wide Web Consortium (2003)

    Google Scholar 

  56. Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, pp. 2–8. IEEE Computer Society Press, Los Alamitos (2001)

    Chapter  Google Scholar 

  57. Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  58. Grandison, T.W.A., Sloman, M.: Sultan - a language for trust specification and analysis. In: Eighth Workshop of the HP OpenView University Association, Berlin, June 24-27, HP OpenView University Association (2001), http://www.hpovua.org/PUBLICATIONS/PROCEEDINGS/8_HPOVUAWS/Papers/Paper01.2-Grandison-Sultan.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruohomaa, S., Kutvonen, L. (2005). Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_6

Download citation

  • DOI: https://doi.org/10.1007/11429760_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26042-4

  • Online ISBN: 978-3-540-32040-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics