Abstract
We propose computational, declarative definitions of the concepts of weak and strong trust relations between interacting agents, and trust domains of trust-related agents in distributed systems. Our definitions yield computational complexity results for deciding potential and actual trust relationships and membership in trust domains. We instantiate our trust concepts in four major applications of trust, namely: Trusted Third Parties (TTPs), the Web of Trust, Public-Key Infrastructures (PKIs), and Identity-Based Cryptography. Finally, we point out computational means for building trust, and by that, building up trust relations and trust domains. Our defining principle for weak and strong trust is (common) belief in and knowledge of agent correctness, respectively
- Cloud computing. http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.Google Scholar
- R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, second edition, 2008. Google Scholar
Digital Library
- C. Areces and B. ten Cate. Handbook of Modal Logic, chapter Hybrid Logics. Volume 3 of Blackburn et al. {5}, 2007.Google Scholar
- P. Blackburn and J. van Benthem. Handbook of Modal Logic, chapter Modal Logic: A Semantic Perspective. Volume 3 of Blackburn et al. {5}, 2007.Google Scholar
- P. Blackburn, J. van Benthem, and F. Wolter, editors. Handbook of Modal Logic, volume 3 of Studies in Logic and Practical Reasoning. Elsevier, 2007. Google Scholar
Digital Library
- C. Boyd and A. Mathuria. Protocols for Authentication and Key Establishment. Springer, 2003. Google Scholar
Digital Library
- J. Bradfield and C. Stirling. Handbook of Modal Logic, chapter Modal Mu-Calculi. Volume 3 of Blackburn et al. {5}, 2007.Google Scholar
- M. Carbone, M. Nielsen, and V. Sassone. A formal model for trust in dynamic networks. In Proceedings of the Conference on Software Engineering and Formal Methods, 2003.Google Scholar
Cross Ref
- M. Carbone, M. Nielsen, and V. Sassone. A calculus for trust management. In Proceedings of the Conference on Foundations of Software Technology and Theoretical Computer Science, volume 3328 of LNCS. Springer, 2004. Google Scholar
Digital Library
- B.A. Davey and H.A. Priestley. Introduction to Lattices and Order. Cambridge University Press, 1990 (2002).Google Scholar
Cross Ref
- R. Demolombe. Reasoning about trust: A formal logical framework. In Proceedings of the Conference on Trust Management, volume 2995 of LNCS. Springer, 2004.Google Scholar
Cross Ref
- D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(12), 1983.Google Scholar
- R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi. Reasoning about Knowledge. MIT Press, 1995. Google Scholar
Digital Library
- J.D. Guttman, F.J. Thayer, J.C. Carlson, J.C. Herzog, J.D. Ramsdell, and B.T. Sniffen. Trust management in strand spaces: A rely-guarantee method. In Proceedings of the European Symposium on Programming, volume 2986 of LNCS. Springer, 2004.Google Scholar
Cross Ref
- J.Y. Halpern and Y. Moses. Knowledge and common knowledge in a distributed environment. Journal of the ACM, 37(3), 1990. Google Scholar
Digital Library
- J.Y. Halpern and Y. Moses. A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence, 54(3), 1992. Google Scholar
Digital Library
- J.Y. Halpern and Y. Moses. The effect of bounding the number of primitive propositions and the depth of nesting on the complexity of modal logic. Artificial Intelligence, 75(2), 1995. Google Scholar
Digital Library
- J. Huang and M.S. Fox. An ontology of trust -- formal semantics and transitivity. In Proceedings of the Conference on Electronic Commerce. ACM, 2006. Google Scholar
Digital Library
- J. Huang and D. Nicol. A calculus of trust and its application to PKI and identity management. In Proceedings of the Symposium on Identity and Trust on the Internet. ACM, 2009. Google Scholar
Digital Library
- M. Joye and G. Neven. Identity-Based Cryptography. IOS Press, 2009.Google Scholar
- L.M. Kaufman. Data security in the world of cloud computing. IEEE Security & Privacy, 7(4), 2009. Google Scholar
Digital Library
- K. Krukowa and A. Twigg. The complexity of fixed point models of trust in distributed networks. Theoretical Computer Science, 389(3), 2007. Google Scholar
Digital Library
- Ch.-J. Liau. Belief, information acquisition, and trust in multi-agent systems -- a modal logic formulation. Artificial Intelligence, 149(1), 2003. Google Scholar
Digital Library
- N.A. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, 1996. Google Scholar
Digital Library
- F. Martinelli and M. Petrocchi. A uniform framework for security and trust modeling and analysis with Crypto-CCS. Electronic Notes in Theoretical Computer Science, 186, 2007. Google Scholar
Digital Library
- J.-J. Meyer and F. Veltnam. Handbook of Modal Logic, chapter Intelligent Agents and Common Sense Reasoning. Volume 3 of Blackburn et al. {5}, 2007.Google Scholar
- B. Michael. In clouds shall we trust? IEEE Security & Privacy, 7(5), 2009. Google Scholar
Digital Library
- M. Nielsen, K. Krukow, and V. Sassone. A Bayesian model for event-based trust. Electronic Notes in Theoretical Computer Science, 172, 2007. Google Scholar
Digital Library
- R. Parikh. Social software. Synthese, 132, 2002.Google Scholar
- L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1), 1998. Google Scholar
Digital Library
- P.V. Rangan. An axiomatic basis of trust in distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy, 1988.Google Scholar
Cross Ref
- S. Ruohomaa and L. Kutvonen. Trust management survey. In Proceedings of the Conference on Trust Management, volume 3477 of LNCS. Springer, 2005. Google Scholar
Digital Library
- A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 2007. Google Scholar
Digital Library
- B. Schneier. Security, group size, and the human brain. IEEE Security & Privacy, 7(4), 2009. Google Scholar
Digital Library
- H. van Ditmarsch, W. van der Hoek, and B. Kooi. Dynamic Epistemic Logic, volume 337 of Synthese Library. Springer, 2007. Google Scholar
Digital Library
- H.C.A. van Tilborg, editor. Encyclopedia of Cryptography and Security, pages 398--400. Springer, 2005. Google Scholar
Digital Library
- D. Xiu and Z. Liu. A formal definition for trust in distributed systems. In Proceedings of the Information Security Conference, volume 3650 of LNCS. Springer, 2005. Google Scholar
Digital Library
- A. Yao. Protocols for secure computations. In Proceedings of the IEEE Symposium on Foundations of Computer Science, 1982. Google Scholar
Digital Library
- H. Yu, Ch. Jin, and H. Che. A description logic for PKI trust domain modeling. In Proceedings of the Conference on Information Technology and Applications. IEEE Computer Society, 2005. Google Scholar
Digital Library
- W. Zhao, V. Varadharajan, and G. Bryan. Analysis and modelling of trust in distributed information systems. In Proceedings of the Conference on Information Systems Security, volume 3803 of LNCS. Springer, 2005. Google Scholar
Digital Library
- Philip Zimmermann. http://www.philzimmermann.com/.Google Scholar
Index Terms
(auto-classified)Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography
Recommendations
Benevolence trust: a key determinant of user continuance use of online social networks
Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas ...
Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust's Influence on Individual Decision-Making
While an increasing number of trust studies examine technological artifacts as trust recipients, there is still a lack of basic understanding of how technology trust relates to traditional trust and its role within the broader nomological net ...
Trust and Distrust Definitions: One Bite at a Time
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial PerspectivesResearchers have remarked and recoiled at the literature confusion regarding the meanings of trust and distrust. The problem involves both the proliferation of narrow intra-disciplinary research definitions of trust and the multiple meanings the word ...






Comments