Abstract
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security policies and make decisions on security-related actions. Most logic-based trust management systems assume monotonicity where additional information can only result in the increasing of trust. The monotonic assumption oversimplifies the real world by not considering negative information, thus it cannot handle many real world scenarios. In this paper we present Shinren, a novel non-monotonic trust management system based on bilattice theory and the any-world assumption. Shinren takes into account negative information and supports reasoning with incomplete information, uncertainty and inconsistency. Information from multiple sources such as credentials, recommendations, reputation and local knowledge can be used and combined in order to establish trust. Shinren also supports prioritisation which is important in decision making and resolving modality conflicts that are caused by non-monotonicity.
This research was supported by the UK’s EPSRC research grant EP/C537181/1 (Caregrid) and EU FP7 research grant 213339 (ALLOW).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society, Los Alamitos (1996)
Mayer, R.C., Davis, J.H., Schoorman, D.F.: An integrative model of organizational trust. The Academy of Management Review 20(3), 709–734 (1995)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The keynote trust-management system, version 2. RFC 2704 (1999)
Jim, T.: Sd3: A trust management system with certified evaluation. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 106–115. IEEE Computer Society, Los Alamitos (2001)
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, pp. 114–130 (2002)
Hess, A., Seamons, K.E.: An access control model for dynamic client-side content. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 207–216. ACM Press, New York (2003)
Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: SEFM, pp. 54–61 (2003)
Chu, Y.H., Feigenbaum, J., LaMacchia, B.A., Resnick, P., Strauss, M.: Referee: Trust management for web applications. Computer Networks 29(8-13), 953–964 (1997)
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: IEEE Symposium on Security and Privacy, pp. 2–14 (2000)
Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic trust management for P2P applications. Electronic Notes in Theoretical Computer Science 157(3), 113–130 (2006)
Gelder, A.V., Ross, K.A., Schlipf, J.S.: Unfounded sets and well-founded semantics for general logic programs. In: PODS, pp. 221–230. ACM, New York (1988)
Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (1994)
Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–212 (2001)
Yu, B., Singh, M.P.: Detecting deception in reputation management. In: AAMAS, pp. 73–80. ACM, New York (2003)
Ginsberg, M.L.: Multivalued logics: a uniform approach to reasoning in artificial intelligence. Computational Intelligence 4, 265–316 (1988)
Loyer, Y., Straccia, U.: Any-world assumptions in logic programming. Theor. Comput. Sci. 342(2-3), 351–381 (2005)
Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about datalog (and never dared to ask). IEEE Trans. Knowl. Data Eng. 1(1), 146–166 (1989)
Dong, C., Dulay, N.: Shinren: Non-monotonic trust management for distributed systems. Technical Report DTR10-5, Department of Computing, Imperial College London (March 2010)
Alchourrón, C.E., Gärdenfors, P., Makinson, D.: On the logic of theory change: Partial meet contraction and revision functions. J. Symb. Log. 50(2), 510–530 (1985)
Brewka, G.: Reasoning about priorities in default logic. In: AAAI, pp. 940–945 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Dong, C., Dulay, N. (2010). Shinren: Non-monotonic Trust Management for Distributed Systems. In: Nishigaki, M., Jøsang, A., Murayama, Y., Marsh, S. (eds) Trust Management IV. IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol 321. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13446-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-13446-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13445-6
Online ISBN: 978-3-642-13446-3
eBook Packages: Computer ScienceComputer Science (R0)