Advertisement

A Formal Definition for Trust in Distributed Systems

  • Daoxi Xiu
  • Zhaoyu Liu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3650)

Abstract

Trust is an important concept in distributed computing environments and plays a critical role in ensuring and enhancing system security. Although various trust models have been proposed for distributed or pervasive computing systems, little research has been conducted to describe trust in precise and formal way. In this paper, we present a formal definition to express the meaning of trust in distributed computing systems. With this definition, we rigorously analyze the important properties of trust relation, such as reflexivity and conditional transitivity, and describe the trust relations in Role-Based Access Control. Our definition is comprehensive in that the semantic meaning of the trust definition is feasible to describe trust relations in both traditional distributed systems and dynamic pervasive computing environments. This research provides a solid base for formal trust reasoning and effective trust management implementation in distributed systems and pervasive computing environments.

Keywords

Trust Security Trust Management Distributed Systems Pervasive Computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Unified Modeling Language Specification, OMG (2004), http://www.uml.org/
  2. 2.
    Beth, T., Borcherdingm, M., Klein, B.: Trust Relationships in Secure Systems- A Distributed Authentication Perspective. In: Proceedings of the IEEE Symposium in Security and Privacy, Oakland, CA, USA (May 24-26, 1993)Google Scholar
  3. 3.
    Blaze, M., Feigenbaum, F., Angelos, D., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Fagin, R., Halpern, Y.: I’m OK If You’re OK on the Notation of Trusting Communication. Journal of Philosophical Logic 17, 329–354 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communication Surveys, 2–16 (Fourth Quarter 2000)Google Scholar
  6. 6.
    Jφsang, A., Knapskog, S.J.: A Metric for Trusted Systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, Arlington, Virginia, USA, pp. 16–29 (1998)Google Scholar
  7. 7.
    Lamsal, P.: Understanding Trust and Security (2001), http://www.cs.Helsinki.FI/u/lampa/papers/UnderstandingTrustAndSecurity.pdf
  8. 8.
    Li, N., Mitchell, J.C.: RT: A Role-based Trust-management Framework. In: Proceedings of The Third DARPA Information Survivability Conference and Exposition, Washington, D.C, pp. 201–212 (2003)Google Scholar
  9. 9.
    Liu, Z., Joy, T., Thompson, R.: A Dynamic Trust Model for Mobile Ad Hoc Networks. In: The 10th IEEE InternationalWorkshop on Future Trends in Distributed Computing Systems, Suzhou, China (2004)Google Scholar
  10. 10.
    McKnight, D.H., Chervany, N.L.: The Meanings of Trust. In: Trust in Cyber- Societies. LNAI, vol. 2246, pp. 27–54 (2001)Google Scholar
  11. 11.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based Access Control Models. IEEE Computer 29, 38–47 (1996)Google Scholar
  12. 12.
    Shmatikov, V., Talcott, C.: Reputation-Based Trust Management. In: Workshop on Issues in the Theory of Security, WITS (2003)Google Scholar
  13. 13.
    Tomlinson, E.C., Lewicki, R.J.: Trust and Trust Building (2002), http://www.beyondintractability.org/m/trustbuilding.jsp
  14. 14.
    Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating Trust on the Web. IEEE Internet Computing 6(6), 30–37 (2002)CrossRefGoogle Scholar
  15. 15.
    Xiu, D., Liu, Z.: A Dynamic Trust Model for Pervasive Computing Environments. In: The Fourth Annual Security Conference, Las Vegas, NV (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Daoxi Xiu
    • 1
  • Zhaoyu Liu
    • 1
  1. 1.Department of Software and Information SystemsUniversity of North Carolina at CharlotteCharlotteUSA

Personalised recommendations