Abstract
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reasoning about trust. Secure systems have been developed under the premise that concepts like ”trusted” or ”trustworthy” are well understood, unfortunately without even agreeing to what ”trust” means, how to measure it, how to compare two trust values and how to combine two trust values. In this work we propose a new vector model of trust. Our model proposes the notion of different degrees of trust, differentiates between trust and distrust and formalizes the dependence of trust on time. We believe that our model will help answer some of the questions posed earlier.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8, 18–36 (1990)
Jajodia, S., Samarati, P., Subrahmanian, V.: A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 31–42. IEEE Computer Society, Los Alamitos (1997)
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), Maui, Hawaii, USA, pp. 1769–1777. IEEE Computer Society, Los Alamitos (2000)
Rangan, P.: An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Computer Society Symposium on Security and Privacy, Oakland, California, USA, pp. 204–211. IEEE Computer Society, Los Alamitos (1988)
Jones, A., Firozabadi, B.: On the characterization of a trusting agent – aspects of a formal approach. In: Castelfranchi, C., Tan, Y. (eds.) Trust and Deception in Virtual Societies, pp. 163–174. Kluwer Academic Publishers, Dordrecht (2000)
Yahalom, R., Klein, B., Beth, T.: Trust relationship in secure systems: A distributed authentication perspective. In: Proceedings of the IEEE Computer Society Symposium on Security and Privacy, Oakland, California, USA, pp. 150–164. IEEE Computer Society, Los Alamitos (1993)
Yahalom, R., Klein, B.: Trust-based navigation in distributed systems. Computing Systems 7, 45–73 (1994)
Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)
Jøsang, A.: Artificial reasoning with subjective logic. In: Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth, Australia (1997)
Jøsang, A.: A subjective metric of authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 329–344. Springer, Heidelberg (1998)
Jøsang, A.: An algebra for assessing trust in certification chains. In: Proceedings of Network and Distributed Systems Security Symposium (NDSS 1999), San Diego, California, USA, Internet Society (1999)
Cohen, M., Parasuraman, R., Serfaty, R., Andes, R.: Trust in decision aids:a model and a training strategy. Technical Report USAATCOM TR 97-D-4, Cognitive Technologies Inc., Fort Eustis, Virginia, USA (1997)
Li, L.X., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of IEEE Conference on E-Commerce (CEC 2003), Newport Beach, California, USA, pp. 275–284. IEEE Computer Society, Los Alamitos (2003)
Purser, S.: A simple graphical tool for modelling trust. Computers & Security 20, 479–484 (2001)
Bacharach, M., Gambetta, D.: Trust as type identification. In: Castelfranchi, C., Tan, Y. (eds.) Trust and Deception in Virtual Societies, pp. 1–26. Kluwer Academic Publishers, Dordrecht (2000)
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 2–16 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ray, I., Chakraborty, S. (2004). A Vector Model of Trust for Developing Trustworthy Systems. In: Samarati, P., Ryan, P., Gollmann, D., Molva, R. (eds) Computer Security – ESORICS 2004. ESORICS 2004. Lecture Notes in Computer Science, vol 3193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30108-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-30108-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22987-2
Online ISBN: 978-3-540-30108-0
eBook Packages: Springer Book Archive