Abstract
In everyday life, trust is largely built from experience. Reputation-based trust models have been developed to formalize this concept. The application to networks like the Internet where a very large number of predominantly unknown principal identities engage in interactions is appealing considering that the evaluation of trusted experience may result in a more successful choice of trusted parties to interact with.
In this paper we pick the SECURE framework, as developed within the equally named EU project on Global Computing, which builds upon event structures to model possible outcomes of interactions. We extend it by three concepts: (i) a flexible way to determine a degree of trust from given past behavior, (ii) a basic notion of context, exemplarily in the form of roles the interacting parties may occupy, and (iii) we explicitly equip observed events with a time component to refine the granularity of observations.
We extend definitions of concepts used in SECURE in order to incorporate our notion of context information, we provide the syntax and semantics of an LTL-like logic, in its basics similar to the one proposed by Krukow, Nielsen and Sassone, that allows for layered reasoning about context information. We then show how this new language relates to the one used in SECURE and we determine under which conditions our concept of deriving trust from experience may be used within SECURE’s computational model to obtain a global state of trust.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cuppens, F., Demolombe, R.: A modal logical framework for security policies. In: Foundations of Intelligent Systems (1997)
Coker, G., Guttman, J.D., Loscocco, P., Sheehy, J., Sniffen, B.T.: Attestation: Evidence and trust. In: Proc. Information and Communications Security, 10th International Conference (2008)
Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. Springer, Heidelberg (2006)
Eilers, F., Nestmann, U.: Deriving trust from experience (2009), http://www.mtv.tu-berlin.de/menue/forschung/publikationen
Halpern, J.Y., Pucella, R.: A logic for reasoning about evidence. In: Proc. 19th Conference on Uncertainty in Artificial Intelligence (2003)
Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: A trust-based reputation service for virtual organization formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006)
Krukow, K., Nielsen, M., Sassone, V.: A framework for concrete reputation-systems with applications to history-based access control. In: Proc. of the 12th CCS, pp. 7–11 (2005)
Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security 16(1), 63–101 (2008)
Krukow, K.: Towards a Theory of Trust for the Global Ubiquitous Computer. PhD thesis, University of Aarhus (2006)
Kamvar, S.D., Schlosser, M.T., Garcia-molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International World Wide Web Conference (2003)
Nielsen, M., Krukow, K., Sassone, V.: A bayesian model for event-based trust. Electronic Notes on Theoretical Computer Science, pp. 172 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eilers, F., Nestmann, U. (2010). Deriving Trust from Experience. In: Degano, P., Guttman, J.D. (eds) Formal Aspects in Security and Trust. FAST 2009. Lecture Notes in Computer Science, vol 5983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12459-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-12459-4_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12458-7
Online ISBN: 978-3-642-12459-4
eBook Packages: Computer ScienceComputer Science (R0)