Autonomic Trust Management in a Component Based Software System

  • Zheng Yan
  • Ronan MacLaverty
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)


Trust plays an important role in a software system, especially when, the system is component based and varied due to component joining and leaving. How to manage trust in such a system is crucial for embedded devices, such as mobile phones. This paper presents a trust management solution that can manage trust adaptively in a component based software (CBS) system. We develop a formal trust model to specify, evaluate and set up trust relationships that exist among system entities. We further present an autonomic trust management architecture that adopts a number of algorithms for trust assessment and maintenance during component execution. These algorithms use recent advances in Subjective Logic to ensure the management of trust within the CBS system.


Quality Attribute Trust Model Trust Relationship Trust Management Importance Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Denning, D.E.: A New Paradigm for Trusted Systems. In: Proceedings of the IEEE New Paradigms Workshop (1993)Google Scholar
  2. 2.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications and Survey, Forth Quarter 3(4), 2–16 (2000)CrossRefGoogle Scholar
  3. 3.
    Grandison, T., Sloman, M.: Trust Management Tools for Internet Applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 91–107. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–312 (2001)MathSciNetGoogle Scholar
  5. 5.
    Van Ommering, R.: Building Product Populations with Software Components. In: Proceedings of the 24th International Conference on Software Engineering, ICSE 2002, Orlando, Florida, May 19 - 25, pp. 255–265. ACM Press, New York (2002)CrossRefGoogle Scholar
  6. 6.
    Muskens, J., Chaudron, M.: Integrity Management in Component Based Systems. In: Proceedings of the 30th EUROMICRO Conference (Euromicro 2004) Washington, DC, Washington, DC, August 31 - September 03, vol. 00, pp. 611–619 (2004)Google Scholar
  7. 7.
    Paul, E., Butler, L., John, M., Marcus, P., Bryan, W.: A Trusted Open Platform, pp. 55–62. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  8. 8.
    Trusted Computing Group (TCG), TPM Specification, version 1.2 (2003),
  9. 9.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Enhancing Grid Security with Trust Management. In: Proceedings of IEEE International Conference on Services Computing (SCC 2004), September 15-18, pp. 303–310 (2004)Google Scholar
  10. 10.
    Twigg, A.: A Subjective Approach to Routing in P2P and Ad Hoc Networks. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 225–238. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zheng Yan
    • 1
  • Ronan MacLaverty
    • 1
  1. 1.Nokia Research CenterHelsinkiFinland

Personalised recommendations