A Task Ordering Approach for Automatic Trust Establishment

  • Francisco Moyano
  • Carmen Fernandez-Gago
  • Isaac Agudo
  • Javier Lopez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7159)


Trust has become essential in computer science as a way of assisting the process of decision-making, such as access control. In any system, several tasks may be performed, and each of these tasks might pose different associated trust values between the entities of the system. For instance, in a file system, reading and overwriting a file are two tasks that pose different trust values between the users who can carry out them. In this paper, we propose a model for automatically establishing trust relationships between entities considering an established order among tasks.


Trust Evaluation Trust Relationship Reputation System Access Control Policy Task Order 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    NESSoS FP7 Project: Network of Excellence on Engineering Secure Future Internet Software Services and Systems,
  2. 2.
    Selection and Documentation of the Two Major Application Case Studies. NESSoS Deliverable 11.2 (October 2011)Google Scholar
  3. 3.
    Agudo, I., Fernandez-Gago, C., Lopez, J.: A Model for Trust Metrics Analysis. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol. 5185, pp. 28–37. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  4. 4.
    Brændeland, G., Stølen, K.: Using Risk Analysis to Assess user Trust: A Net-Bank Scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 146–160. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRefzbMATHGoogle Scholar
  6. 6.
    Gil, Y., Artz, D.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2) (2011)Google Scholar
  7. 7.
    Hasan, O., Brunie, L., Pierson, J.-M., Bertino, E.: Elimination of Subjectivity from Trust Recommendation. In: The 3rd IFIP International Conference on Trust Management (TM 2009), pp. 65–80 (June 2009)Google Scholar
  8. 8.
    Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia (June 2002)Google Scholar
  9. 9.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43, 618–644 (2007)CrossRefGoogle Scholar
  10. 10.
    Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2003)Google Scholar
  11. 11.
    Li, Y., Sun, H., Chen, Z., Ren, J., Luo, H.: Using trust and risk in access control for grid environment. In: Proceedings of the 2008 International Conference on Security Technology, SECTECH 2008, pp. 13–16. IEEE Computer Society, Washington, DC, USA (2008)Google Scholar
  12. 12.
    Li, Y., Zhao, M., Sun, H., Chen, Z.: A trust and risk framework to enhance reliable interaction in e-commerce. In: IEEE International Conference on E-Business Engineering, pp. 475–480 (2008)Google Scholar
  13. 13.
    Seo, Y., Han, S.: Local scalar trust metrics with a fuzzy adjustment method. TIIS 4(2), 138–153 (2010)Google Scholar
  14. 14.
    Toahchoodee, M., Xie, X., Ray, I.: Towards Trustworthy Delegation in Role-Based Access Control Model. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 379–394. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  15. 15.
    World Health Organization. eHealth Tools and Services: Needs of Member States (2006)Google Scholar
  16. 16.
    Zhang, M., Yang, B., Zhu, S., Zhang, W.: Ordered semiring-based trust establish model with risk evaluating. I. J. Network Security 8(2), 101–106 (2009)Google Scholar
  17. 17.
    Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)Google Scholar
  18. 18.
    Ziegler, C.-N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers 7(4-5), 337–358 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Francisco Moyano
    • 1
  • Carmen Fernandez-Gago
    • 1
  • Isaac Agudo
    • 1
  • Javier Lopez
    • 1
  1. 1.Department of Computer ScienceUniversity of MalagaMálagaSpain

Personalised recommendations