Skip to main content

Theories of Trust for Communication Protocols

  • Conference paper
  • 570 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5586))

Abstract

Trust is a critical issue for communication protocols in open systems that operate in dynamic and highly uncertain environments. It influences not only the specification of security policies but also the techniques needed to manage and implement security policies. A formal system for the specification of trust for such systems requires the ability to reason about agent beliefs as well as the evolution of the system through time. In this paper, we use a fibred logic called FL which is obtained by combining a belief logic with a temporal logic for specifying agent beliefs and establishing trust theories for communication protocols. A theory of trust for a given system is captured by a set of rules in FL that describes the trust of agents in the system. This enables automated reasoning about theories of trust using the decision procedures of FL such as axiom systems and tableaux. Theories of trust are generally established based on the initial trust of agents in the security mechanisms of the system in which they are deployed. Such theories provide a foundation for reasoning about agent beliefs as well as security properties that systems may satisfy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Computer Society Symposium on research in Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  MATH  Google Scholar 

  3. Liu, C., Ozols, M.A.: Trust in secure communication systems – the concept, representations, and reasoning techniques. In: McKay, B., Slaney, J.K. (eds.) Canadian AI 2002. LNCS, vol. 2557, pp. 60–70. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Liu, C.: Logical foundations for reasoning about trust in secure digital communication. In: Stumptner, M., Corbett, D.R., Brooks, M. (eds.) Canadian AI 2001. LNCS, vol. 2256, pp. 333–344. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248. IEEE Computer Society Press, Los Alamitos (1990)

    Google Scholar 

  6. Oorschot, P.C.V.: Extending cryptographic logics of belief to key agreement protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 233–243. ACM Press, New York (1993)

    Google Scholar 

  7. Syverson, P.F., Oorschot, P.C.V.: A unified cryptographic protocol logic. NRL Publication (1996)

    Google Scholar 

  8. Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201–216 (1991)

    Google Scholar 

  9. Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57–63. IEEE Computer Society Press, Los Alamitos (1989)

    Chapter  Google Scholar 

  10. Wedel, G., Kessler, V.: Formal semantics for authentication logics. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 219–241. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  11. Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 150–164 (1993)

    Google Scholar 

  12. Boyd, C., Mao, W.: Designing secure key exchange protocols. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 93–105. Springer, Heidelberg (1994)

    Google Scholar 

  13. Bacchus, F., Grove, A.J., Halpern, J.Y., Koller, D.: From statistical knowledge bases to degrees of belief. CoRR cs.AI/0307056 (2003)

    Google Scholar 

  14. Gabbay, D., Pigozzi, G., Woods, J.: Controlled revision – an algorithmic approach for belief revision. Journal of Logic and Computation 12(1), 3–22 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  15. Weydert, E.: Ranking revision reloaded. In: Formal Models of Belief Change in Rational Agents (2007)

    Google Scholar 

  16. Smets, P., Ristic, B.: Kalman filter and joint tracking and classification based on belief functions in the tbm framework. Information Fusion 8(1), 16–27 (2007)

    Article  Google Scholar 

  17. Ma, J., Orgun, M.A.: Formalising theories of trust for authentication protocols. Information Systems Frontiers 10(1), 19–32 (2008)

    Article  Google Scholar 

  18. Finger, M., Gabbay, D.M.: Adding a temporal dimension to a logic system. Journal of Logic, Language and Information 1, 203–233 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  19. Liu, C., Ozols, M.A., Orgun, M.A.: A fibred belief logic for multiagent systems. In: Zhang, S., Jarvis, R. (eds.) AI 2005. LNCS, vol. 3809, pp. 29–38. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Orgun, M.A., Governatori, G., Liu, C.: Modal tableaux for verifying security protocols. In: Proceedings of the Formal Approaches to Multi-Agent Systems, FAMAS 2006, pp. 31–46. Riva del Garda, Italy (2006)

    Google Scholar 

  21. Orgun, M.A., Liu, C., Governatori, G.: Modal tableaux for verifying stream authentication protocols. Autonomous Agents and Multi-Agent Systems 19(1), 53–75 (2009)

    Article  Google Scholar 

  22. Liu, C., Orgun, M.A.: Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation 22(5/6), 699–720 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  23. Gabbay, D.M.: Fibring logics. Journal of Logic, Language and Information 9(4), 511–513 (2000)

    Article  MathSciNet  Google Scholar 

  24. Kracht, M., Wolter, F.: Properties of independently axiomatizable bimodal logics. The Journal of Symbolic Logic 56(4), 1469–1485 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  25. Gabbay, D.M., Shehtman, V.B.: Products of modal logics, part 1. Logic Journal of the IGPL 6(1), 73–146 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  26. Liu, C., Ozols, M.A., Orgun, M.A.: A temporalised belief logic for specifying the dynamics of trust for multi-agent systems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 142–156. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  27. Liu, C., McLean, P., Ozols, M.A.: Combining logics for modelling security policies. In: ACSC, pp. 323–332 (2005)

    Google Scholar 

  28. Gabbay, D.M.: Fibring Logics. Oxford Logic Guides, vol. 38. Oxford University Press, Oxford (1998)

    MATH  Google Scholar 

  29. Orgun, M.A., Ma, J., Liu, C., Governatori, G.: Analysing stream authentication protocols in autonomous agent-based systems. In: Proceedings of the 2nd International Symposium on Dependable Autonomic and Secure Computing, pp. 325–332. IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  30. Kripke, S.A.: Semantical considerations on modal logic. Acta Philosophica Fennica 16, 83–94 (1963)

    MathSciNet  MATH  Google Scholar 

  31. Ma, J., Orgun, M.: Tableaux-based proof techniques for verifying multi-agent systems. In: Proceedings of the 2008 IEEE International Conference on Distributed Human-Machine Systems (DHMS). IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

  32. SPORE: Security protocols open repository (2009), http://www.lsv.ens-cachan.fr/Software/spore/ (last accessed April 14)

  33. Anderson, R.J., Needham, R.M.: Programming satan’s computer. In: Computer Science Today, pp. 426–440 (1995)

    Google Scholar 

  34. Lowe, G.: A family of attacks upon authentication protocols. Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester (1997)

    Google Scholar 

  35. Steiner, J.G., Neuman, B.C., Schiller, J.: Kerberos: An authentication service for open network systems. In: Proceedings of the Winter 1988 Usenix Conference, pp. 191–202 (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, J., Orgun, M.A., Sattar, A. (2009). Theories of Trust for Communication Protocols. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds) Autonomic and Trusted Computing. ATC 2009. Lecture Notes in Computer Science, vol 5586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02704-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02704-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02703-1

  • Online ISBN: 978-3-642-02704-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics