Trust in E-Services
DOI: 10.4018/978-1-59904-207-7.ch005
|View full text |Cite
|
Sign up to set email alerts
|

Holistic Trust Design of E-Services

Abstract: Abstract. As a central issue of modern e-services, trust has to be tackled early during the development phases. We present and compare in this chapter various works and methodologies that contribute to this aspect. A Holistic Trust Design Methodology that combines useful aspects encountered in the existing works is then described in detail. It is based on a systematic analysis of scenarios that describe the typical use of the e-service by using a Trust Analysis Grid. The Trust Analysis Grid is composed of elev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Trust factors, such as credibility, ease of use or risk, have been elicited in e-commerce [5] offering design and (web) interface elements and models of trust that can be used as starting points for HCI developers. Design methodologies of pervasive systems have been augmented with trust requirements [10] such as audit trail (or accountability), harm, reliability and accuracy. Other work has focused on topics such as website credibility [7] and reputation [9], [17].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Trust factors, such as credibility, ease of use or risk, have been elicited in e-commerce [5] offering design and (web) interface elements and models of trust that can be used as starting points for HCI developers. Design methodologies of pervasive systems have been augmented with trust requirements [10] such as audit trail (or accountability), harm, reliability and accuracy. Other work has focused on topics such as website credibility [7] and reputation [9], [17].…”
Section: Related Workmentioning
confidence: 99%
“…Also all the data which are exchanged within the platform are integrityprotected, using typically a keyed-Hash Message Authentication Code (HMAC), and possibly bound to particular software configurations if Proof-Carrying Code (PCC) or Trusted Computing are used. In that case, cryptographic keys can be hardware-protected in the Trusted Platform Module and secure channels are reinforced via mutual attestation of software configurations on both sides of the communication (a detailed account of the use of Trusted Computing for this purpose is given in [10]). …”
Section: B Trust Assessment Platformmentioning
confidence: 99%
“…Trust in some works is treated as an ad-hoc operational feature, and that treatment tends to be more difficult and costly [36]. When trust requirements are not considered in a consistent way from the early stages of the software development, but in an ad-hoc way, they will result in conflicts with the other functional and non functional requirements of the system.…”
Section: Positioningmentioning
confidence: 99%