Advertisement

A Vector Model of Trust for Developing Trustworthy Systems

  • Indrajit Ray
  • Sudip Chakraborty
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3193)

Abstract

All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reasoning about trust. Secure systems have been developed under the premise that concepts like ”trusted” or ”trustworthy” are well understood, unfortunately without even agreeing to what ”trust” means, how to measure it, how to compare two trust values and how to combine two trust values. In this work we propose a new vector model of trust. Our model proposes the notion of different degrees of trust, differentiates between trust and distrust and formalizes the dependence of trust on time. We believe that our model will help answer some of the questions posed earlier.

Keywords

IEEE Computer Society Trust Relationship Vector Model Direct Knowledge Trust Degree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8, 18–36 (1990)CrossRefGoogle Scholar
  2. 2.
    Jajodia, S., Samarati, P., Subrahmanian, V.: A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 31–42. IEEE Computer Society, Los Alamitos (1997)Google Scholar
  3. 3.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), Maui, Hawaii, USA, pp. 1769–1777. IEEE Computer Society, Los Alamitos (2000)Google Scholar
  4. 4.
    Rangan, P.: An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Computer Society Symposium on Security and Privacy, Oakland, California, USA, pp. 204–211. IEEE Computer Society, Los Alamitos (1988)Google Scholar
  5. 5.
    Jones, A., Firozabadi, B.: On the characterization of a trusting agent – aspects of a formal approach. In: Castelfranchi, C., Tan, Y. (eds.) Trust and Deception in Virtual Societies, pp. 163–174. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  6. 6.
    Yahalom, R., Klein, B., Beth, T.: Trust relationship in secure systems: A distributed authentication perspective. In: Proceedings of the IEEE Computer Society Symposium on Security and Privacy, Oakland, California, USA, pp. 150–164. IEEE Computer Society, Los Alamitos (1993)CrossRefGoogle Scholar
  7. 7.
    Yahalom, R., Klein, B.: Trust-based navigation in distributed systems. Computing Systems 7, 45–73 (1994)Google Scholar
  8. 8.
    Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)Google Scholar
  9. 9.
    Jøsang, A.: Artificial reasoning with subjective logic. In: Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth, Australia (1997)Google Scholar
  10. 10.
    Jøsang, A.: A subjective metric of authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 329–344. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. 11.
    Jøsang, A.: An algebra for assessing trust in certification chains. In: Proceedings of Network and Distributed Systems Security Symposium (NDSS 1999), San Diego, California, USA, Internet Society (1999)Google Scholar
  12. 12.
    Cohen, M., Parasuraman, R., Serfaty, R., Andes, R.: Trust in decision aids:a model and a training strategy. Technical Report USAATCOM TR 97-D-4, Cognitive Technologies Inc., Fort Eustis, Virginia, USA (1997)Google Scholar
  13. 13.
    Li, L.X., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of IEEE Conference on E-Commerce (CEC 2003), Newport Beach, California, USA, pp. 275–284. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  14. 14.
    Purser, S.: A simple graphical tool for modelling trust. Computers & Security 20, 479–484 (2001)CrossRefGoogle Scholar
  15. 15.
    Bacharach, M., Gambetta, D.: Trust as type identification. In: Castelfranchi, C., Tan, Y. (eds.) Trust and Deception in Virtual Societies, pp. 1–26. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  16. 16.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 2–16 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Indrajit Ray
    • 1
  • Sudip Chakraborty
    • 1
  1. 1.Colorado State University Fort CollinsUSA

Personalised recommendations