Toward Trust Management in Autonomic and Coordination Applications

  • Yuan Wang
  • Feng Xu
  • Ye Tao
  • Chun Cao
  • Jian Lü
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)


Trust management is an efficient approach to ensure the security and reliability in the autonomic and coordination systems. Various trust management systems are proposed from different viewpoints. However, evaluating different trust management approaches is usually more intuitive than formal. This paper presents a role-based formal framework to specify trust management systems. By quantifying two types of trust commonly occurring in the existing trust management systems, the framework proposes a set of elements to express the assertions and recommendation relationships in trust management. Furthermore, some facilities are provided to specify the semantics of trust engines. The framework makes it more convenient to understand, compare, analyze and design trust management systems.


Trust Relationship Trust Management Access Control Model Role Base Access Control Trust Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shmatikov, V.: Reputation-Based Trust Management. Gorrieri R. (ed) Journal of Computer Security, special issue on selected papers of WITS 2003 (2004) (accepted)Google Scholar
  2. 2.
    Blaze, M., et al.: Decentralized trust Management. In: Proc. Of IEEE Conf. On Privacy and Security (1996)Google Scholar
  3. 3.
    Blaze, M., et al.: KeyNote: Trust management for public-key infrastructures. In: Proc. of Security Protocols International Workshop (1998)Google Scholar
  4. 4.
    Wobber, E., et al.: Authentication in the Taos operating system. ACM Transactions on Computer Systems 12(1), 3–32 (1994)CrossRefGoogle Scholar
  5. 5.
    Li, N., et al.: RT: A Role-based Trust-management Framework. In: Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C., pp. 201–212. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  6. 6.
    Freudenthal, E., et al.: drbac: Distributed role-based access control for dynamic coalition environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS 2002) (2002)Google Scholar
  7. 7.
    Abdul-Rahman, A., et al.: A Distributed Trust Model. In: Proceedings of the 1997 New Security Paradigms Workshop, Cumbria, pp. 48–60. ACM, New York (1997)CrossRefGoogle Scholar
  8. 8.
    Beth, T., et al.: Valuation of Trust In Open Network. In: Proceedings of European Symposium On Research in Security, Brighton, pp. 3–18. Springer, Heidelberg (1994)Google Scholar
  9. 9.
    Jøsang, A.: An Algebra for Assessing Trust in Certificate Chains. In: The Internet Society Symposium on Network and Distributed System Security, San Diego, California (February 3-5, 1999)Google Scholar
  10. 10.
    XU, F., et al.: Design of A Trust Valuation Model in Software Service Coordination. Journal of software 14(6), 1043–1051 (2003)MATHGoogle Scholar
  11. 11.
    Ferraiolo, D., et al.: A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet. ACM Transactions on Information and System Security 2(1), 34–64 (1999)CrossRefGoogle Scholar
  12. 12.
    Grandison, T., et al.: Trust Management Tools For Internet Application. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 91–107. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Weeks, S.: Understanding Trust Management System. In: IEEE Symposium on Security and Privacy, Oakland, California ( May 14–16, 2001)Google Scholar
  14. 14.
    Nielsen, M., et al.: Towards a formal notion of trust. In: Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming Uppsala, Sweden, pp. 4–7 (2003) ISBN: 1-58113-705-2Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yuan Wang
    • 1
  • Feng Xu
    • 1
  • Ye Tao
    • 1
  • Chun Cao
    • 1
  • Jian Lü
    • 1
  1. 1.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingChina

Personalised recommendations