FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES

Ioanna Dionysiou, Dave Bakken, Carl Hauser, Deborah Frincke

2008

Abstract

The diversity of the kinds of interactions between principals in distributed computing systems, including critical infrastructures, has expanded rapidly in recent years. However, such applications and their users are vulnerable with respect to both the diversity of the principals providing these services or data and the interactions between them. This paper introduces formalisms for a new trust model that addresses these limitations. The novelty of the new model is its ability to specify and reason about trust dynamically and when composed beyond pairwise relationships for a specific interaction. An intuitive and practical way is presented to manage end-to-end trust assessment for a particular activity, where multiple trust relationships are examined in order to derive the overall trust for the activity.

References

  1. Abdul-Rahman, A. and Hailes, S. (1997). A distributed trust model. In Proceedings of the ACM New Security Paradigms Workshop, pages 48-60.
  2. Abdul-Rahman, A. and Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33th Hawaii International Conference on System Sciences (HICSS), pages 1769-1777, Maui, Hawaii.
  3. Blaze, M., Feigenbaum, J., and Keromytis, A. D. (1998). Keynote: Trust management for public key infrastructures. In Proceedings of the 6th International Workshop on Security Protocols, Cambridge, UK.
  4. Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decentralized trust management. In SP 7896: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 164, Washington, DC, USA. IEEE Computer Society.
  5. Buskens, V. W. (2002). Social Networks and Trust, volume 30 of Theory and Decision Library. Series C, Game Theory, Mathematical Programming, and Operations Research. Boston, London Kluwer Academic Publishers.
  6. Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. (1997). Referee: trust management for web applications. Comput. Netw. ISDN Syst., 29(8- 13):953-964.
  7. DHS (2006). Protected critical infrastructure information (pcii) program. www.dhs.gov.
  8. Dionysiou, I. (2006). Dynamic and Composable Trust for Indirect Interactions, Ph.D. Dissertation. Department of Electrical Engineering and Computer Science, Washington State University.
  9. Dionysiou, I., Frincke, D., Bakken, D., and Hauser, C. (2007). An approach to trust management challenges for critical infrastructures. In Proceedings of the 2nd International Workshop on Critical Information Infrastructures Security (CRITIS07), to appear in Lecture Notes in Computer Science Series, Springer Berlin, 2007, Malaga, Spain.
  10. Elmasri, R. and Navathe, S. (2000). Fundamentals of Database Systems. Addison-Wesley Longman, Inc.
  11. Force, U. C. P. S. O. T. (2004). Final report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. https://reports.energy.gov/BlackoutFinal-Web.pdf.
  12. Grandison, T. (2001). Trust specification and analysis for internet applications. Technical report, Ph.D. Thesis, Imperial College of Science Technology and Medicine, Department of Computing, London.
  13. Grandison, T. and Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3(4):2-16.
  14. Group, T. C. (2004). Overview. TCG.
  15. Herzberg, A., Mass, Y., Michaeli, J., Ravid, Y., and Naor, D. (2000). Access control meets public key infrastructure, or: Assigning roles to strangers. In SP 7800: Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 2, Washington, DC, USA. IEEE Computer Society.
  16. Josang, A. (1997). Prospectives of modeling trust in information security. In Proceedings of the 2nd Australasian Conference on Information Security and Privacy, Sydney, Australia.
  17. Josang, A., Gray, E., and Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2):139 - 161.
  18. Marsh, S. (1994). Formalizing Trust as a Computational Concept. Department of Computer Science, University of Sterling.
  19. Presti, S. L., Cusack, M., Booth, C., Allsopp, D., Kirton, M., Exon, N., Beautement, P., Butler, M., Leuschel, M., and Turner, P. (2003). Trust issues in pervasive environments, deliverable wp2-01. Technical report, University of Southampton and QinetiQ.
  20. Vacca, J. (2004). Public Key Infrastructure: Building Trusted Applications and Web Services. AUERBACH.
  21. Winslett, M., Yu, T., Seamons, K., Hess, A., Jacobson, J., Jarvis, R., Smith, B., and Yu, L. (2002). The trustbuilder architecture for trust negotiation. IEEE Internet Computing, 6(6):30 - 37.
  22. Zimmermann, P. R. (1995). The official PGP User's Guide. MIT Press.
Download


Paper Citation


in Harvard Style

Dionysiou I., Bakken D., Hauser C. and Frincke D. (2008). FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008) ISBN 978-989-8111-59-3, pages 546-553. DOI: 10.5220/0001926905460553


in Bibtex Style

@conference{special session on trust in pervasive systems and networks08,
author={Ioanna Dionysiou and Dave Bakken and Carl Hauser and Deborah Frincke},
title={FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)},
year={2008},
pages={546-553},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001926905460553},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)
TI - FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES
SN - 978-989-8111-59-3
AU - Dionysiou I.
AU - Bakken D.
AU - Hauser C.
AU - Frincke D.
PY - 2008
SP - 546
EP - 553
DO - 10.5220/0001926905460553