Skip to main content

Methodology to Bridge Different Domains of Trust in Mobile Communications

  • Conference paper
  • First Online:
Trust Management (iTrust 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2692))

Included in the following conference series:

Abstract

Trust is playing an important role in communications and transactions. Based on different reasons of trust, different trusted domains, possibly disjoint, are formed in mobile communications, preventing complete systems from working properly. What is lacked therein is a bridge that can link domains, across trust gaps to establish a complete trusted mobile communication system. In this paper, the authors propose a generic method to analyze and model a mobile communication system into a number of trusted domains. In order to overcome the trust gaps among the originally disjoint domains, the authors further propose three approaches to bridge different domains and demonstrate the use of mobile Personal Trusted Devices, such as mobile handsets to act as the said bridge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diamadi, Z. Fischer, M.J.: A simple game for the study of trust in distributed systems. International Software Engineering Symposium 2001 (ISES’01), Wuhan University Journal of Natural Sciences Conference (March 2001).

    Google Scholar 

  2. Diego Gambetta.: Can We Trust Trust?. In, Trust: Making and breaking Cooperative Relations, Gambetta, D (ed.) Basil Blackwell. Oxford, (1990).

    Google Scholar 

  3. Daniel W. Manchala: Xerox Research and Technology. E-Commerce Trust Metrics and Models. IEEE Internet Computing, vol.4, no.2 p.36–44 (2000).

    Article  Google Scholar 

  4. McKnight, D. Harrison, Chervany Norman L.: The meanings of Trust. In http://www.misrc.umn.edu/wpaper/wp96-04.htm

  5. McKnight, D. Harrison, Chervany Norman L.: What is Trust? A Conceptual Analysis and An Interdisciplinary Model. In Proceedings of the 2000 Americas Conference on Information Systems (AMCI2000). AIS, Long Beach, CA (August 2000).

    Google Scholar 

  6. Mui Lik, Mohtashemi Mojdeh, Halberstadt Ari: A Computational Model of Trust and Reputation. In Proc. Of the 35th Annual Hawaii International Conference on System sciences, 7–10 (Jan. 2002), Big Island, HI, USA

    Google Scholar 

  7. Warne, D., Holland, C.P.: Exploring trust in flexible working using a new model. BT Technology Journal, vol.17, no.1, p.111–119. (Jan 1999).

    Article  Google Scholar 

  8. Yao-Hua Tan. Thoen, W.: Toward a generic model of trust for electronic commerce. International Journal of Electronic Commerce vol.5, no.2, p.61–74.

    Google Scholar 

  9. Egger Florian N.: Towards a Model of Trust for E-Commerce System Design. In Proc. Of the CHI2000 Workshop: Designing Interactive Systems for 1-to-1 E-commerce.

    Google Scholar 

  10. Abdul-Rahman Alfarez, Halles Stephen: A Distributed Trust Model. In Proc. Of New Security Paradigms Workshop, ACM, New York, NY, USA (1998).

    Google Scholar 

  11. Gerck Ed. Overview of Certification System: X.509, PKIX, CA, PGP & SKIP. In http://www.thebell.net/papers/certover.pdf

  12. Perlman, R.: An overview of PKI trust models. IEEE Network, vol.13, no.6 p.38–43.

    Google Scholar 

  13. Robles, S., Borrell, J., Bigham, J., Tokarchuk, L., Cuthbert, L.: Design of a trust model for a secure multi-agent marketplace, Fifth International Conference on Autonomous Agents, Montreal, Canada (05.2001).

    Google Scholar 

  14. Wu Wen, Mizoguchi, F.: An authorization-based trust model for multiagent systems, Applied Artificial Intelligence vol.14, no.9 p.909–25.

    Google Scholar 

  15. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust, Academy of Management Review, Vol. 20, No 3, pp. 709–734 (1995).

    Article  Google Scholar 

  16. MeT Personal Trusted Device Definition (2001) http://www.mobiletransaction.org/pdf/R11/MeT-PTD-Def-R11.pdf

  17. L. Zhou, Z. J. Haas: Securing Ad Hoc Networks. IEEE Network, 13(6): 24–30 (Nov/Dec 1999).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yan, Z., Cofta, P. (2003). Methodology to Bridge Different Domains of Trust in Mobile Communications. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-44875-6_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40224-4

  • Online ISBN: 978-3-540-44875-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics