Abstract
Credential networks have recently been introduced as a general model for distributed authenticity and trust management in open networks. This paper focuses on issues related to the implementation of credential networks. It presents a system called Caution, which consists of a simple language to define credential networks and an underlying machinery to perform the evaluation. The paper also describes the necessary algorithms in further details.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jonczy, J., Haenni, R.: Credential networks: a general model for distributed trust and authenticity management. In: PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 101–112 (2005)
Haenni, R.: Towards a unifying theory of logical and probabilistic reasoning. In: ISIPTA 2005, 4th International Symposium on Imprecise Probabilities and Their Applications, Pittsburgh, USA, pp. 193–202 (2005)
Haenni, R., Kohlas, J., Lehmann, N.: Probabilistic argumentation systems. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, Netherlands. Algorithms for Uncertainty and Defeasible Reasoning, vol. 5, pp. 221–288. Kluwer Academic Publishers, Dordrecht (2000)
Zimmermann, P.R.: PGP User’s Guide. Special Topics, vol. 2 (1994)
Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 324–350. Springer, Heidelberg (1996)
Kohlas, R., Maurer, U.: Confidence valuation in a public-key infrastructure based on uncertain evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 93–112. Springer, Heidelberg (2000)
Marchesini, J., Smith, S.W.: Modeling public key infrastructures in the real world. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 118–134. Springer, Heidelberg (2005)
Jøsang, A.: An algebra for assessing trust in certification chains. In: NDSS 1999: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA (1999)
Mahoney, G., Myrvold, W., Shoja, G.C.: Generic reliability trust model. In: Ghorbani, A., Marsh, S. (eds.) PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 113–120 (2005)
Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp. 185–210. Springer, London (1999)
Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information and System Security 2(2), 138–158 (1999)
Haenni, R.: Cost-bounded argumentation. International Journal of Approximate Reasoning 26(2), 101–127 (2001)
Haenni, R.: Anytime argumentative and abductive reasoning. Soft Computing – A Fusion of Foundations, Methodologies and Applications 8(2), 142–149 (2003)
Jonczy, J.: Kredentialnetze: ein allgemeines Modell für den Umgang mit Vertrauen und Authentizität in verteilten Netzwerken. Master’s thesis, University of Fribourg, Switzerland (2005)
Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jonczy, J., Haenni, R. (2006). Implementing Credential Networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_13
Download citation
DOI: https://doi.org/10.1007/11755593_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34295-3
Online ISBN: 978-3-540-34297-7
eBook Packages: Computer ScienceComputer Science (R0)