Gathering Experience in Trust-Based Interactions

  • Colin English
  • Sotirios Terzis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3986)


Evidence based trust management, where automated decision making is supported through collection of evidence about the trustworthiness of entities from a variety of sources, has gained popularity in recent years. So far work in this area has primarily focussed on schemes for combining evidence from potentially unreliable sources (recommenders) with the aim of improving the quality of decision making. The large body of literature on reputation systems is testament to this. At the same time, little consideration has been given to the actual gathering of useful and detailed experiential evidence. Most proposed systems use quite simplistic representations for experiences, and mechanisms where high level feedback is provided by users. Consequently, these systems provide limited support for automated decision making. In this paper we build upon our previous work in trust-based interaction modelling and we present an interaction monitor that enables automated collection of detailed interaction evidence. The monitor is a prototype implementation of our generic interaction monitoring architecture that combines well understood rule engine and event management technology. This paper also describes a distributed file server scenario, in order to demonstrate our interaction model and monitor. Finally, the paper presents some preliminary results of a simulation-based evaluation of our monitor in the context of the distributed file server scenario.


Interaction Model Intrusion Detection System Trust Management Cost Event Client Application 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, vol. 6. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
  2. 2.
    Cilia, M., Bornhovd, C., Buchmann, A.P.: Moving active functionality from centralized to open distributed heterogeneous environments. In: CooplS 2001: Proceedings of the 9th International Conference on Cooperative Information Systems, pp. 195–210. Springer, Heidelberg (2001)Google Scholar
  3. 3.
    English, C., Terzis, S.: Monitoring interactions between trusting entities A Simulation-based Analysis. Technical Report 02, University of Strathclyde, Computer and Information Sciences (December 2005) (to appear)Google Scholar
  4. 4.
    English, C., Terzis, S., Nixon, P.: Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Personal and Ubiquitous Computing (November 2005)Google Scholar
  5. 5.
    Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. In: Pervasive Computing Magazine, vol. 2, pp. 52–61. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  6. 6.
    Friedman-Hill, E.: Jess in Action. Manning Publications (2003)Google Scholar
  7. 7.
    The Mandarax Project Homepage,
  8. 8.
    The Mantaray Project Homepage,
  9. 9.
    The RuleCore System Homepage,
  10. 10.
    Jøsang, A., Gray, E., Kinateder, M.: Analysing topologies of transitive trust. In: Dimitrakos, T., Martielli, F. (eds.) Proceedings of the Workshop on Formal Aspects of Security and Trust (FAST 2003) at FM 2003, Pisa, Italy, September 2003. IIT Technical Reports, vol. TR-10/2003, pp. 9–22 (2003)Google Scholar
  11. 11.
    Nielsen, M., Krukow, K.: On the formal modelling of trust in reputation-based systems. In: Karhumäki, J., et al. (eds.) Theory Is Forever. LNCS, vol. 3113, pp. 192–204. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Paton, N., Diaz, O.: Active database systems. ACM Computing Surveys 31, 63–103 (1999)CrossRefGoogle Scholar
  13. 13.
    Terzis, S., Wagealla, W., English, C., Nixon, P.: Trust lifecycle management in a global computing environment. In: Priami, C., Quaglia, P. (eds.) GC 2004. LNCS, vol. 3267, pp. 291–313. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of the 4th ACM conference on Electronic commerce, San Diego, CA, USA, pp. 228–229. ACM Press, New York (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Colin English
    • 1
  • Sotirios Terzis
    • 1
  1. 1.Department of Computer and Information SciencesUniversity of StrathclydeUK

Personalised recommendations