2010 7th International Conference on Ubiquitous Intelligence &Amp; Computing and 7th International Conference on Autonomic &Amp 2010
DOI: 10.1109/uic-atc.2010.77
|View full text |Cite
|
Sign up to set email alerts
|

Formal Definitions for Trust in Trusted Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…There have been some efforts to produce mathematical definitions of trust [22,10], however intuitive informal definitions, such as "the degree of subjective belief about the behaviors of (information from) a particular entity" [8], or "the expectation that a service will be provided or a commitment will be fulfilled" [15], are convenient for the purposes of this paper. Trust research can be organized [3] in four major areas: (1) policy-based trust, (2) reputation based trust, (3) general models of trust and (4) trust information resources, related with the following applications: networking, semantic web, computational models, game theory and agents, software engineering and information resources.…”
Section: Introductionmentioning
confidence: 99%
“…There have been some efforts to produce mathematical definitions of trust [22,10], however intuitive informal definitions, such as "the degree of subjective belief about the behaviors of (information from) a particular entity" [8], or "the expectation that a service will be provided or a commitment will be fulfilled" [15], are convenient for the purposes of this paper. Trust research can be organized [3] in four major areas: (1) policy-based trust, (2) reputation based trust, (3) general models of trust and (4) trust information resources, related with the following applications: networking, semantic web, computational models, game theory and agents, software engineering and information resources.…”
Section: Introductionmentioning
confidence: 99%
“…Cho et al [5] state that Trust is subjective, changes in time (dynamic) and is context-dependent. Some authors point that Trust is reflexive, an agent trust in itself always, non antisymmetric, meaning that mutual trust does not imply identity, and that Trust decays with time and (physical or virtual) distance [7], [2].…”
Section: A Trustmentioning
confidence: 99%
“…Ukil et al in [22] summarize both points of view as: trust collects, encodes, analyzes, and presents evidence that is related to competence, honesty, security or dependability with the purpose that all activity in a network can be carried as securely as possible. Samian et al [23] and Gai et al [24] argue that before trust the most common mechanism to secure routing protocols was to use cryptographic approaches. However because of the ever-increasing number and sophistication of attacks, cryptographic approaches can no longer be considered to be the sole solution to protect wireless networks.…”
Section: Benefits Of Using Trust-based Approaches For Routing In Amentioning
confidence: 99%
“…Authors also consider that cryptographic approaches tend to be static (i.e, cryptographic keys are used for long periods of time), and that given the dynamicity of the wireless networks there is the need for dynamic approaches, such as trust. Gai [24] points out that the most used technique to establish trusted paths in wireless networks is by using certificates issued by a trusted central authority. However such technique is not possible in wireless networks because of the absence of such authority.…”
Section: Benefits Of Using Trust-based Approaches For Routing In Amentioning
confidence: 99%