Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1519144.1519149acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

QuanTM: a quantitative trust management system

Published: 31 March 2009 Publication History
  • Get Citation Alerts
  • Abstract

    Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved. QuanTM, a QTM system, selectively combines elements from trust management and reputation management to create a novel method for policy evaluation. Trust management, while effective in managing access with delegated credentials (as in PolicyMaker and KeyNote), needs greater flexibility in handling situations of partial trust. Reputation management provides a means to quantify trust, but lacks delegation and policy enforcement.
    This paper reports on QuanTM's design decisions and novel policy evaluation procedure. A representation of quantified trust relationships, the trust dependency graph, and a sample QuanTM application specific to the KeyNote trust management language, are also proposed.

    References

    [1]
    OpenBSD. http://www.openbsd.org.
    [2]
    M. Abadi. Access control in a core calculus of dependency. ACM SIGPLAN Notices, 41(9):263--273, 1999.
    [3]
    M. Abadi, A. B. N. Heintze, and J. G. Riecke. A core calculus of dependency. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 147--160, January 1999.
    [4]
    B. Atkinson. Web services security (WS-Security). http://msdn.microsoft.com/library/default.asp? url=/library/en-us/dnglobspec/html/ws-security.asp, 2002.
    [5]
    M. Y. Becker, C. Fournet, and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.
    [6]
    M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust-management system, version 2. IETF RFC, 2704:164--173, September 1999.
    [7]
    M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). In Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, pages 59--63, 1999.
    [8]
    M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164--173. IEEE Computer Society, 1996.
    [9]
    M. Blaze, S. Kannan, A. D. Keromytis, I. Lee, W. Lee, O. Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Sp. Issue on Trust Mangement), 2009.
    [10]
    M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli. Fine grained access control with trust and reputation management for Globus. In GADA '07, volume 4804 of LNCS, pages 1505--1515, 2007.
    [11]
    A. Jøsang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, 9(3):279--311, June 2001.
    [12]
    A. Jøsang, R. Hayward, and S. Pope. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference, 2006.
    [13]
    L. Kagal, S. Cost, T. Finin, and Y. Peng. A framework for distributed trust management. In Proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.
    [14]
    S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, May 2003.
    [15]
    A. D. Keromytis and J. M. Smith. Requirements for scalable access control and security management architectures. ACM Transactions on Internet Technology, 7(4), November 2007.
    [16]
    H. Li and M. Singhai. Trust management in distributed systems. IEEE Computer, 40(2):45--53, February 2007.
    [17]
    N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6, 2003.
    [18]
    N. Li and J. Mitchell. RT: a role-based trust-management framework. DARPA Information Survivability Conference and Exposition, 2003. Proceedings, 1:201--212, April 2003.
    [19]
    J. Liu and V. Issarny. Enhanced reputation mechanism for mobile ad hoc networks. LNCS, 2995:48--62, 2004.
    [20]
    [email protected]. FreeBSD port keynote-2.3-1. http://www.freebsd.org/ports/security.html.
    [21]
    G. Suryanarayana, J. R. Erenkrantz, and R. N. Taylor. An architectural approach for decentralized trust management. IEEE Internet Computing, 9(6):16--23, 2005.
    [22]
    J. Valdes, R. E. Tarjan, and E. L. Lawler. The recognition of series parallel digraphs. In Proceedings of the 11th Annual ACM Symposium on Theory of Computing, pages 1--12, Atlanta, GA, 1979. ACM.
    [23]
    A. G. West, S. Kannan, I. Lee, and O. Sokolsky. An evaluation framework for reputation management systems. Working chapter for Trust Modeling and Management in Digital Environments: From Social Concept to System Development, (Zheng Yan, ed.).

    Cited By

    View all
    • (2022)An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online GamesIEEE Access10.1109/ACCESS.2022.323014810(132232-132249)Online publication date: 2022
    • (2020)An Adjusted Free-Market-Inspired Approach to Mitigate Free-Riding Behavior in Peer-to-Peer Fog ComputingElectronics10.3390/electronics91220279:12(2027)Online publication date: 30-Nov-2020
    • (2018)Opportunities and Challenges in Monitoring Cyber-Physical Systems SecurityLeveraging Applications of Formal Methods, Verification and Validation. Industrial Practice10.1007/978-3-030-03427-6_2(9-18)Online publication date: 30-Oct-2018
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    EUROSEC '09: Proceedings of the Second European Workshop on System Security
    March 2009
    57 pages
    ISBN:9781605584720
    DOI:10.1145/1519144
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 March 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. KeyNote
    2. QuanTM
    3. TNA-SL
    4. quantified trust management
    5. reputation management
    6. trust management

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    EuroSys '09
    Sponsor:
    EuroSys '09: Fourth EuroSys Conference 2009
    March 31, 2009
    Nuremburg, Germany

    Acceptance Rates

    Overall Acceptance Rate 47 of 113 submissions, 42%

    Upcoming Conference

    EuroSys '25
    Twentieth European Conference on Computer Systems
    March 30 - April 3, 2025
    Rotterdam , Netherlands

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online GamesIEEE Access10.1109/ACCESS.2022.323014810(132232-132249)Online publication date: 2022
    • (2020)An Adjusted Free-Market-Inspired Approach to Mitigate Free-Riding Behavior in Peer-to-Peer Fog ComputingElectronics10.3390/electronics91220279:12(2027)Online publication date: 30-Nov-2020
    • (2018)Opportunities and Challenges in Monitoring Cyber-Physical Systems SecurityLeveraging Applications of Formal Methods, Verification and Validation. Industrial Practice10.1007/978-3-030-03427-6_2(9-18)Online publication date: 30-Oct-2018
    • (2017)A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust InferenceIEEE Transactions on Computational Intelligence and AI in Games10.1109/TCIAIG.2016.25930009:4(354-368)Online publication date: Dec-2017
    • (2015)A SOUND approach to security in mobile and cloud-oriented environments2015 IEEE International Symposium on Technologies for Homeland Security (HST)10.1109/THS.2015.7225266(1-7)Online publication date: Apr-2015
    • (2014)Distributed Certificates Chain Searching Algorithms Based on TrustworthyJournal of Multimedia10.4304/jmm.9.4.548-5529:4Online publication date: 8-Apr-2014
    • (2013)Trust Management and User’s Trust Perception in e-BusinessIT Policy and Ethics10.4018/978-1-4666-2919-6.ch004(64-83)Online publication date: 2013
    • (2012)Trust Management and User’s Trust Perception in e-BusinessHandbook of Research on E-Business Standards and Protocols10.4018/978-1-4666-0146-8.ch015(321-341)Online publication date: 2012
    • (2011)Using new fusion operations to improve trust expressiveness of subjective logicWuhan University Journal of Natural Sciences10.1007/s11859-011-0766-316:5(376-382)Online publication date: 3-Sep-2011
    • (2010)A flexible architecture for privacy-aware trust managementJournal of Theoretical and Applied Electronic Commerce Research10.4067/S0718-187620100002000065:2(77-96)Online publication date: 1-Aug-2010
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media