Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31105
Trust Managementfor Pervasive Computing Environments

Authors: Denis Trcek


Trust is essential for further and wider acceptance of contemporary e-services. It was first addressed almost thirty years ago in Trusted Computer System Evaluation Criteria standard by the US DoD. But this and other proposed approaches of that period were actually solving security. Roughly some ten years ago, methodologies followed that addressed trust phenomenon at its core, and they were based on Bayesian statistics and its derivatives, while some approaches were based on game theory. However, trust is a manifestation of judgment and reasoning processes. It has to be dealt with in accordance with this fact and adequately supported in cyber environment. On the basis of the results in the field of psychology and our own findings, a methodology called qualitative algebra has been developed, which deals with so far overlooked elements of trust phenomenon. It complements existing methodologies and provides a basis for a practical technical solution that supports management of trust in contemporary computing environments. Such solution is also presented at the end of this paper.

Keywords: Internet Security, Modeling and simulation, Multi-Agent Systems, Trust Management, reasoning and judgment, qualitativealgebra

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1289


[1] V. Reding, Safety on the Net. Int. High Level Research Seminar on Trust in the Net, Vienna, 2006, barroso/ reding/docs/speeches/viennaq 20060209.pdf.
[2] D. Denning, "A new Paradigm for Trusted Systems", Proc. of ACM SIGSAC New Security Paradigms Workshop, ACM, New York, pp. 36-41, 1993.
[3] E. Damiani, D.C. Vimercati, S. Paraboschi, P. Samarati, F. Violante, "A reputation-based approach for choosing reliable resources in peerto- peer networks", CCS02 - Proceedings of the Ninth ACM Conference on Computer and Communications Security, ACM Press, pp. 207-216, 2002.
[4] J. Miller, P. Resnick, D. Singer, PICS Rating Services and Rating Systems, 1996,
[5] M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management", Proceedings of the -96 IEEE Symposium on Security and Privacy, Oakland, pp. 164-173, 1996.
[6] A. Herzberg et al., "Access Control Meets Public Key Infrastructure", Proc. of the IEEE Conf. on Security and Privacy, Oakland, pp. 2-14, 2000.
[7] G. Klyne, "Survey of Papers from the iTrust 2003 and 2004 Trust Management Conferences", 2004, html.
[8] T. Dimitrakos, Wilson M., S. Ristol, TrustCoM - A Trust and Contract Management Framework enabling Secure Collaborations in Dynamic Virtual Organisations, ERCIM News, No. 59, pp. 59-60, 2004.
[9] Y. Wang, J. Vassileva, "Trust and Reputation Model in Peer-to-Peer Networks", Third International Conference on Peer-to-Peer Computing (P2P-03), pp.150, 2003.
[10] A. J├©sang, "A Logic for Uncertain Probabilities", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, Issue 3, pp. 279-311, World Scientific Publishing, 2001, London.
[11] J. Piaget, Judgment and Reasoning in the Child, Routledge, London, 1999.
[12] B. M. Muir, Trust in automatition, Part 1 - Theoretical issues in the study of trust and human intervention in automated systems. Ergonomics, Vol. 37, No. 11, 1905-1922, 1994.
[13] R.E. Nisbett, D.H. Krantz, C. Jepson, T.G. Fong, Improving inductive inference, in Kahneman D., Slovic P., Tversky A. (Eds.), Judgment under uncertainty: Heuristic and Biases, pp. 445-459, Cambridge University Press, Cambridge, 1982.
[14] D. Trˇcek, A formal apparatus for modeling trust in computing environments, Mathematical and Computer Modelling 49(2009), 226-233, Elsevier, 2008.
[15] ITU-T, Specification of Abstract Syntax Notation One - ASN.1, Recommendation X.208, Geneva, 1988.
[16] D. Kovaˇc, D. Trˇcek, "Qualitative trust modeling in SOA", it J. Syst. Archit., Vol. 55, No. 4, pp. 255-263, Elsevier, 2009.