Skip to main content

Trusting Collaboration in Global Computing Systems

  • Conference paper
  • First Online:
Trust Management (iTrust 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2692))

Included in the following conference series:

Abstract

A significant characteristic of global computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction will function as expected. In this paper, we explore an architecture for interaction/collaboration in global computing systems. This architecture reflects the aspects of the trust lifecycle in three stages: trust formation, trust evolution and trust exploitation, forming a basis for risk assessment and interaction decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. EU Future Emerging Technologies, Global Computing Initiative. http://www.cordis.lu/ist/fetgc.htm

  2. S. Marsh: “Formalising Trust as a Computational Concept”. Ph.D. Thesis, University of Stirling, 1994.

    Google Scholar 

  3. A. Abdul-Rahman: “The PGP Trust Model” Department of Computer Science, University College London, 1996.

    Google Scholar 

  4. C. English, P. Nixon, S. Terzis, A. McGettrick and H. Lowe: “Security Models for Trusting Network Appliances”. In Proceedings of the 5th IEEE International Workshop on Networked Appliances, pp 39–44 October 2002.

    Google Scholar 

  5. M. Carbone, O. Danvy, I. Damgaard, K. Krukow, A. Møller, J. B. Nielsen, M. Nielsen: “SECURE Deliverable 1.1: A Model For Trust”, December 2002.

    Google Scholar 

  6. J. Bacon, N. Dimmock, D. Ingram, K. Moody, B. Shand, A. Twigg: “SECURE Deliverable 3.1: Definition of Risk Model”, December 2002

    Google Scholar 

  7. J. M. Seigneur, S. Farrell, C. Jensen, E. Gray and C. Yong: “End-to-end trust in pervasive computing starts with recognition”. To appear in the Proceedings of the First International Conference on Security in Pervasive Computing, 2003.

    Google Scholar 

  8. U. Maurer: “Modelling a Public-Key Infrastructure”. In Proceedings of the 1996 European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 1146, pp. 325–350, 1996.

    Google Scholar 

  9. A. Jøsang: “The Consensus Operator for Combining Beliefs” Artificial Intelligence Journal, 142(1–2), p.157–170, Oct. 2002.

    Article  Google Scholar 

  10. C. M. Jonker, J. Treur: “Formal Analysis of Models for the Dynamics of Trust Based on Experiences” Modelling Autonomous Agents in a Multi-Agent World 1999 European Workshop on Multi-Agent Systems. pp. 221–231, 1999.

    Google Scholar 

  11. C. Bryce, V. Cahill, G. Di Marzo Serugendo, C. English, S. Farrell, E. Gray, C. Jensen, P. Nixon, J-M. Seignuer, S. Terzis, W. Wagealla, C. Yong: “SECURE Deliverable 5.1: Application Scenarios”, September 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

English, C., Wagealla, W., Nixon, P., Terzis, S., Lowe, H., McGettrick, A. (2003). Trusting Collaboration in Global Computing Systems. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-44875-6_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40224-4

  • Online ISBN: 978-3-540-44875-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics