Skip to main content

A Task Ordering Approach for Automatic Trust Establishment

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7159)

Abstract

Trust has become essential in computer science as a way of assisting the process of decision-making, such as access control. In any system, several tasks may be performed, and each of these tasks might pose different associated trust values between the entities of the system. For instance, in a file system, reading and overwriting a file are two tasks that pose different trust values between the users who can carry out them. In this paper, we propose a model for automatically establishing trust relationships between entities considering an established order among tasks.

Keywords

  • Trust Evaluation
  • Trust Relationship
  • Reputation System
  • Access Control Policy
  • Task Order

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

The research leading to these results have received funding from the European Community’s Seventh Framework Programme FP7/2007-2013 as part of the Network of Excellence NESSoS (www.nessos-project.eu) under grant agreement number 256980. The first author is funded by the Spanish Ministry of Education through the National F.P.U. Program.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NESSoS FP7 Project: Network of Excellence on Engineering Secure Future Internet Software Services and Systems, http://www.nessos-project.eu/

  2. Selection and Documentation of the Two Major Application Case Studies. NESSoS Deliverable 11.2 (October 2011)

    Google Scholar 

  3. Agudo, I., Fernandez-Gago, C., Lopez, J.: A Model for Trust Metrics Analysis. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol. 5185, pp. 28–37. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  4. Brændeland, G., Stølen, K.: Using Risk Analysis to Assess user Trust: A Net-Bank Scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 146–160. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  5. Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    CrossRef  MATH  Google Scholar 

  6. Gil, Y., Artz, D.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2) (2011)

    Google Scholar 

  7. Hasan, O., Brunie, L., Pierson, J.-M., Bertino, E.: Elimination of Subjectivity from Trust Recommendation. In: The 3rd IFIP International Conference on Trust Management (TM 2009), pp. 65–80 (June 2009)

    Google Scholar 

  8. Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia (June 2002)

    Google Scholar 

  9. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43, 618–644 (2007)

    CrossRef  Google Scholar 

  10. Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2003)

    Google Scholar 

  11. Li, Y., Sun, H., Chen, Z., Ren, J., Luo, H.: Using trust and risk in access control for grid environment. In: Proceedings of the 2008 International Conference on Security Technology, SECTECH 2008, pp. 13–16. IEEE Computer Society, Washington, DC, USA (2008)

    Google Scholar 

  12. Li, Y., Zhao, M., Sun, H., Chen, Z.: A trust and risk framework to enhance reliable interaction in e-commerce. In: IEEE International Conference on E-Business Engineering, pp. 475–480 (2008)

    Google Scholar 

  13. Seo, Y., Han, S.: Local scalar trust metrics with a fuzzy adjustment method. TIIS 4(2), 138–153 (2010)

    Google Scholar 

  14. Toahchoodee, M., Xie, X., Ray, I.: Towards Trustworthy Delegation in Role-Based Access Control Model. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 379–394. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  15. World Health Organization. eHealth Tools and Services: Needs of Member States (2006)

    Google Scholar 

  16. Zhang, M., Yang, B., Zhu, S., Zhang, W.: Ordered semiring-based trust establish model with risk evaluating. I. J. Network Security 8(2), 101–106 (2009)

    Google Scholar 

  17. Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)

    Google Scholar 

  18. Ziegler, C.-N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers 7(4-5), 337–358 (2005)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moyano, F., Fernandez-Gago, C., Agudo, I., Lopez, J. (2012). A Task Ordering Approach for Automatic Trust Establishment. In: Barthe, G., Livshits, B., Scandariato, R. (eds) Engineering Secure Software and Systems. ESSoS 2012. Lecture Notes in Computer Science, vol 7159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28166-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28166-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28165-5

  • Online ISBN: 978-3-642-28166-2

  • eBook Packages: Computer ScienceComputer Science (R0)