Valuation of trust in open networks

  • Thomas Beth
  • Malte Borcherding
  • Birgit Klein
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 875)


Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by recommendation of other entities whose recommendations are known to be reliable. To consider an entity as being trustworthy, especially if there have been several mediators or contradicting recommendations, it is necessary to have a means of estimating its trustworthiness. In this paper we present a method for the valuation of trustworthiness which can be used to accept or reject an entity as being suitable for sensitive tasks. It constitutes an extension of the work of Yahalom, Klein and Beth ([YKB93]).


Trust values Trust measures Distributed systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BAN89]
    M. Burrows, M. Abadi, R. Needham, “A Logic of Authentication”, Proc. of the 12 th ACM Symposium on Operating Systems Principles, Litchfield Park, Arizona, 1989. Published as ACM Operating Systems Review, 23 no 5 (1989).Google Scholar
  2. [Bor93]
    M. Borcherding, “Ermittlung verschieden vertrauenswürdiger Pfade in offenen Netzen”, Diploma thesis at the European Institute for System Security, University of Karlsruhe, 1993 (in German).Google Scholar
  3. [GNY90]
    L. Gong, R. Needham, R. Yahalom, “Reasoning about Belief in Cryptographic Protocols”, Proc. 1990 IEEE Symp. on Research in Security and Privacy, 234–248.Google Scholar
  4. [Ran92]
    P. V. Rangan, “An Axiomatic Theory of Trust in Secure Communication Protocols”, Computers and Security 11 (1992) 163–172, Elsevier Science Publishers Ltd., Oxford 1992.CrossRefGoogle Scholar
  5. [TH92]
    A. Tarah, Ch. Huitema, “Associating Metrics to Certification Paths”, Proceedings of the Second European Symposium on Research in Computer Security (ESORICS) 1992, 175–189, Springer LNCS 648, Berlin 1992.Google Scholar
  6. [YKB93]
    R. Yahalom, B. Klein, Th. Beth, “Trust Relationships in Secure Systems — A Distributed Authentication Perspective”, Proc. 1993 IEEE Symp. on Research in Security and Privacy, 150–164.Google Scholar
  7. [YKB94]
    R. Yahalom, B. Klein, Th. Beth, “Trust-based Navigation in Distributed Systems”, to appear in: Special issue “Security and Integrity of Open Systems” of the journal “Computing Systems”, 1994.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Thomas Beth
    • 1
  • Malte Borcherding
    • 1
  • Birgit Klein
    • 1
  1. 1.European Institute for System SecurityUniversity of KarlsruheGermany

Personalised recommendations