A Task Ordering Approach for Automatic Trust Establishment
Trust has become essential in computer science as a way of assisting the process of decision-making, such as access control. In any system, several tasks may be performed, and each of these tasks might pose different associated trust values between the entities of the system. For instance, in a file system, reading and overwriting a file are two tasks that pose different trust values between the users who can carry out them. In this paper, we propose a model for automatically establishing trust relationships between entities considering an established order among tasks.
KeywordsTrust Evaluation Trust Relationship Reputation System Access Control Policy Task Order
Unable to display preview. Download preview PDF.
- 1.NESSoS FP7 Project: Network of Excellence on Engineering Secure Future Internet Software Services and Systems, http://www.nessos-project.eu/
- 2.Selection and Documentation of the Two Major Application Case Studies. NESSoS Deliverable 11.2 (October 2011)Google Scholar
- 6.Gil, Y., Artz, D.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2) (2011)Google Scholar
- 7.Hasan, O., Brunie, L., Pierson, J.-M., Bertino, E.: Elimination of Subjectivity from Trust Recommendation. In: The 3rd IFIP International Conference on Trust Management (TM 2009), pp. 65–80 (June 2009)Google Scholar
- 8.Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia (June 2002)Google Scholar
- 10.Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2003)Google Scholar
- 11.Li, Y., Sun, H., Chen, Z., Ren, J., Luo, H.: Using trust and risk in access control for grid environment. In: Proceedings of the 2008 International Conference on Security Technology, SECTECH 2008, pp. 13–16. IEEE Computer Society, Washington, DC, USA (2008)Google Scholar
- 12.Li, Y., Zhao, M., Sun, H., Chen, Z.: A trust and risk framework to enhance reliable interaction in e-commerce. In: IEEE International Conference on E-Business Engineering, pp. 475–480 (2008)Google Scholar
- 13.Seo, Y., Han, S.: Local scalar trust metrics with a fuzzy adjustment method. TIIS 4(2), 138–153 (2010)Google Scholar
- 15.World Health Organization. eHealth Tools and Services: Needs of Member States (2006)Google Scholar
- 16.Zhang, M., Yang, B., Zhu, S., Zhang, W.: Ordered semiring-based trust establish model with risk evaluating. I. J. Network Security 8(2), 101–106 (2009)Google Scholar
- 17.Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)Google Scholar