Academia.eduAcademia.edu

Outline

Trust Managementfor Pervasive Computing Environments

2010

https://doi.org/10.5281/ZENODO.1331844

Abstract

Trust is essential for further and wider acceptance of contemporary e-services. It was first addressed almost thirty years ago in Trusted Computer System Evaluation Criteria standard by the US DoD. But this and other proposed approaches of that period were actually solving security. Roughly some ten years ago, methodologies followed that addressed trust phenomenon at its core, and they were based on Bayesian statistics and its derivatives, while some approaches were based on game theory. However, trust is a manifestation of judgment and reasoning processes. It has to be dealt with in accordance with this fact and adequately supported in cyber environment. On the basis of the results in the field of psychology and our own findings, a methodology called qualitative algebra has been developed, which deals with so far overlooked elements of trust phenomenon. It complements existing methodologies and provides a basis for a practical technical solution that supports management of trust in...

References (16)

  1. V. Reding, Safety on the Net. Int. High Level Research Seminar on Trust in the Net, Vienna, 2006, http://ec.europa.eu/comm/commission barro- so/reding/docs/speeches/viennaq 20060209.pdf.
  2. D. Denning, "A new Paradigm for Trusted Systems", Proc. of ACM SIGSAC New Security Paradigms Workshop, ACM, New York, pp. 36-41, 1993.
  3. E. Damiani, D.C. Vimercati, S. Paraboschi, P. Samarati, F. Violante, "A reputation-based approach for choosing reliable resources in peer- to-peer networks", CCS02 -Proceedings of the Ninth ACM Conference on Computer and Communications Security, ACM Press, pp. 207-216, 2002.
  4. J. Miller, P. Resnick, D. Singer, PICS Rating Services and Rating Systems, 1996, http://www.w3c.org/TR/REC-PICS-services.
  5. M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management", Proceedings of the '96 IEEE Symposium on Security and Privacy, Oakland, pp. 164-173, 1996.
  6. A. Herzberg et al., "Access Control Meets Public Key Infrastructure", Proc. of the IEEE Conf. on Security and Privacy, Oakland, pp. 2-14, 2000.
  7. G. Klyne, "Survey of Papers from the iTrust 2003 and 2004 Trust Man- agement Conferences", 2004, http://www.ninebynine.org/iTrust/iTrust- survey.html.
  8. T. Dimitrakos, Wilson M., S. Ristol, TrustCoM -A Trust and Contract Management Framework enabling Secure Collaborations in Dynamic Virtual Organisations, ERCIM News, No. 59, pp. 59-60, 2004.
  9. Y. Wang, J. Vassileva, "Trust and Reputation Model in Peer-to-Peer Networks", Third International Conference on Peer-to-Peer Computing (P2P'03), pp.150, 2003.
  10. A. Jøsang, "A Logic for Uncertain Probabilities", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, Issue 3, pp. 279-311, World Scientific Publishing, 2001, London.
  11. J. Piaget, Judgment and Reasoning in the Child, Routledge, London, 1999.
  12. B. M. Muir, Trust in automatition, Part 1 -Theoretical issues in the study of trust and human intervention in automated systems. Ergonomics, Vol. 37, No. 11, 1905-1922, 1994.
  13. R.E. Nisbett, D.H. Krantz, C. Jepson, T.G. Fong, Improving inductive inference, in Kahneman D., Slovic P., Tversky A. (Eds.), Judgment under uncertainty: Heuristic and Biases, pp. 445-459, Cambridge University Press, Cambridge, 1982.
  14. D. Trček, A formal apparatus for modeling trust in computing envi- ronments, Mathematical and Computer Modelling 49(2009), 226-233, Elsevier, 2008.
  15. ITU-T, Specification of Abstract Syntax Notation One -ASN.1, Recom- mendation X.208, Geneva, 1988.
  16. D. Kovač, D. Trček, "Qualitative trust modeling in SOA", it J. Syst. Archit., Vol. 55, No. 4, pp. 255-263, Elsevier, 2009.