Trust Managementfor Pervasive Computing Environments

Trust is essential for further and wider acceptance of contemporary e-services. It was first addressed almost thirty years ago in Trusted Computer System Evaluation Criteria standard by the US DoD. But this and other proposed approaches of that period were actually solving security. Roughly some ten years ago, methodologies followed that addressed trust phenomenon at its core, and they were based on Bayesian statistics and its derivatives, while some approaches were based on game theory. However, trust is a manifestation of judgment and reasoning processes. It has to be dealt with in accordance with this fact and adequately supported in cyber environment. On the basis of the results in the field of psychology and our own findings, a methodology called qualitative algebra has been developed, which deals with so far overlooked elements of trust phenomenon. It complements existing methodologies and provides a basis for a practical technical solution that supports management of trust in contemporary computing environments. Such solution is also presented at the end of this paper.

Authors:



References:
[1] V. Reding, Safety on the Net. Int. High Level Research Seminar on Trust
in the Net, Vienna, 2006, http://ec.europa.eu/comm/commission barroso/
reding/docs/speeches/viennaq 20060209.pdf.
[2] D. Denning, "A new Paradigm for Trusted Systems", Proc. of ACM
SIGSAC New Security Paradigms Workshop, ACM, New York, pp. 36-41,
1993.
[3] E. Damiani, D.C. Vimercati, S. Paraboschi, P. Samarati, F. Violante,
"A reputation-based approach for choosing reliable resources in peerto-
peer networks", CCS02 - Proceedings of the Ninth ACM Conference
on Computer and Communications Security, ACM Press, pp. 207-216,
2002.
[4] J. Miller, P. Resnick, D. Singer, PICS Rating Services and Rating Systems,
1996, http://www.w3c.org/TR/REC-PICS-services.
[5] M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management",
Proceedings of the -96 IEEE Symposium on Security and Privacy,
Oakland, pp. 164-173, 1996.
[6] A. Herzberg et al., "Access Control Meets Public Key Infrastructure",
Proc. of the IEEE Conf. on Security and Privacy, Oakland, pp. 2-14,
2000.
[7] G. Klyne, "Survey of Papers from the iTrust 2003 and 2004 Trust Management
Conferences", 2004, http://www.ninebynine.org/iTrust/iTrustsurvey.
html.
[8] T. Dimitrakos, Wilson M., S. Ristol, TrustCoM - A Trust and Contract
Management Framework enabling Secure Collaborations in Dynamic
Virtual Organisations, ERCIM News, No. 59, pp. 59-60, 2004.
[9] Y. Wang, J. Vassileva, "Trust and Reputation Model in Peer-to-Peer
Networks", Third International Conference on Peer-to-Peer Computing
(P2P-03), pp.150, 2003.
[10] A. J├©sang, "A Logic for Uncertain Probabilities", International Journal
of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, Issue 3,
pp. 279-311, World Scientific Publishing, 2001, London.
[11] J. Piaget, Judgment and Reasoning in the Child, Routledge, London,
1999.
[12] B. M. Muir, Trust in automatition, Part 1 - Theoretical issues in the study
of trust and human intervention in automated systems. Ergonomics, Vol.
37, No. 11, 1905-1922, 1994.
[13] R.E. Nisbett, D.H. Krantz, C. Jepson, T.G. Fong, Improving inductive
inference, in Kahneman D., Slovic P., Tversky A. (Eds.), Judgment under
uncertainty: Heuristic and Biases, pp. 445-459, Cambridge University
Press, Cambridge, 1982.
[14] D. Trˇcek, A formal apparatus for modeling trust in computing environments,
Mathematical and Computer Modelling 49(2009), 226-233,
Elsevier, 2008.
[15] ITU-T, Specification of Abstract Syntax Notation One - ASN.1, Recommendation
X.208, Geneva, 1988.
[16] D. Kovaˇc, D. Trˇcek, "Qualitative trust modeling in SOA", it J. Syst.
Archit., Vol. 55, No. 4, pp. 255-263, Elsevier, 2009.