
degree associated with each path is calculated by 
applying a concatenation function to the trusts along 
the path, and finally those trust degrees are 
combined with an aggregation function (Richardson, 
Agrawal, and Domingos, 2003) (Agudo, Fernandez-
Gago, and Lopez, 2008). In this method, a trust 
graph is regarded as several independent paths, 
which is not so reasonable since the effect of trust 
combinations at the intermediate entities is omitted.  
Huang et al proposed an algorithm to make trust 
aggregation in a trust network, which recursively 
simplifies a more complex network to a simpler one, 
by replacing multiple parallel paths into a single arc. 
Each replacement is made by using connection or 
combination operation (Huang and Nicol, 2009). 
Huang’s algorithm and the algorithm proposed in 
this paper all take the connection and the 
combination operations in accordance with the 
process of trust formation. However, this paper 
proposes a novel idea that is to transform a graph 
into an expression. The algorithm first transforms a 
trust graph into a computable expression, and then 
computes the expression to get a trust degree value. 
The expression is not specific to any trust expression 
structures and trust operators, which makes the 
model more flexible. 
6 CONCLUSIONS  
In this paper, the meaning of trust in the context of 
access control is analyzed, and a framework for 
implementing trust degree based access control 
(TDBAC) in social networks and an algorithm for 
trust degree computing on a trust graph is proposed. 
The framework shows how trust can be used to 
realize fine-grained access control.  
For the problem of trust degree calculation based 
on a trust graph, the concepts of the formal trust 
graph expression (FTE) and the computable trust 
graph expression (CTE) are proposed. A virtual arc 
iteration algorithm is defined for generating a FTE 
from a trust graph. The FTE does not bind to any 
specific trust expression structure and the 
connection or combination operators. Hence, the 
FTE based trust calculation method not only 
simplifies trust computations on a complicated 
directed graph, but also makes the calculation more 
flexible and applicable. 
ACKNOWLEDGEMENTS 
The Work was supported by the National Science 
Foundation of China under Grant No. 60573037, the 
Hi-Tech Research and Development Program of 
China under Grant No. 2007AA010301, and the 
National Basic Research Program of China under 
Grant No. 2005CB321901. 
REFERENCES 
Abdul-Rahman, A., 2004. A Framework for Decentralised 
Trust Reasoning, PhD thesis, University of London 
Agudo, I., Fernandez-Gago, C., and Lopez, J., 2008. A 
Model for Trust Metrics Analysis, TrustBus, LNCS 
5185, pages 28–37. 
Atrf, Y., 2002. Building Trust in E-Commerce, IEEE 
Internet Computing. 
Blaze, M., Feigenbaum, J., Lacy, J., 1996. Decentralized 
trust management, IEEE Conference on Security and 
Privacy, Oakland, CA. 
Fast, A., Jensen, D., and Neil Levine B., 2005. Creating 
social networks to improve peer-to-peer networking. 
Proceedings of the eleventh ACM SIGKDD 
international conference on Knowledge discovery in 
data mining, pages 568–573, NY, USA. 
Gambetta, D., 1988. editor. Trust: making and breaking 
cooperative relations. Basil Blackwell.  
Huang, J., and Nicol, D., 2009. A Calculus of Trust and 
Its Applications to PKI and Identity Management, 
Proceedings of the 8th Symposium on  Identity and 
Trust on the Internet. 
ISO,  1989. ISO 7498-2, OSI security architecture. 
Jøsang, A., Hayward, R., Pope, S., 2006. Trust Network 
Analysis with Subjective Logic. Proceedings of the 
Australasian Computer Science Conference 
(ACSC'06), Hobart. 
Krishnan, R., Sandhu, R., Niu, J., Winsborough, W. H.,
2009. Formal Models for Group-Centric Secure 
Information Sharing, Technical Report CS-TR-2009-
002. Department of Computer Science ,  The 
University of Texas, San Antonio. 
Lampson, B. W.,1971. Protection, Proceedings of 5th 
Princeton Conf. on Information Sciences and Systems, 
Princeton, pages 437-443. 
Lang, B., Wang, Z., Wang, Q., 2007. Trust Representation 
and Reasoning for Access Control in Large Scale 
Distributed Systems, Proceedings of the Second 
International Conference on Pervasive Computing 
and Applications, Birbingham, England. 
Richardson, M., Agrawal, R., Domingos, P., 2003. Trust 
Management for the Semantic Web. Proceedings of 
the International Semantic Web Conference, pages 
351-368. 
SECRYPT 2010 - International Conference on Security and Cryptography
48