Proceedings of the 1996 Workshop on New Security Paradigms - NSPW '96 1996
DOI: 10.1145/304851.304877
|View full text |Cite
|
Sign up to set email alerts
|

The right type of trust for distributed systems

Abstract: Abstract.Research in information security has traditionally focused on where to place or how to propagate trust. In that sense, a cyptographic algorithm or protocol is simply a mechanism to transfer trust from where it exists to where it is needed. This paper puts the focus on trust itself and shows that it is a very complex concept with many interesting and important implications. We do not attempt to define a formal trust model, but rather examine the types of trust and trust relationships which are relevant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0
5

Year Published

2003
2003
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 214 publications
(117 citation statements)
references
References 11 publications
0
112
0
5
Order By: Relevance
“…The subjective logic opinion proposed by Jsang [2] and others introduces the concept of evidence space and opinion space to describe and measure the trust relationship, and provides a set of subjective logic for the derivation of trust and comprehensive calculation [3][4][9][10].…”
Section: Subjective Logic Trust Modelmentioning
confidence: 99%
“…The subjective logic opinion proposed by Jsang [2] and others introduces the concept of evidence space and opinion space to describe and measure the trust relationship, and provides a set of subjective logic for the derivation of trust and comprehensive calculation [3][4][9][10].…”
Section: Subjective Logic Trust Modelmentioning
confidence: 99%
“…The domain of trust has been studied from a variety of disciplines. Some of the landmark works in the field of computer science and related areas of study have been contributed by Marsh [ 4 ] in general computer science, Jøsang [5] in computer security, Braynov and Sandholm [6] in electronic commerce, Resnick [7] in reputation systems, Castelfranchi and Falcone [8], [9] in multi-agent systems, Snijders and Keren [10] in game theory, and Slovic [11] in risk management. Outside areas of computing, economists such as Dasgupta [12], psychologists such as Erikson [13], and sociologists such as Coleman [14] and McKnight [15] have studied trust.…”
Section: Location-based Social Networkingmentioning
confidence: 99%
“…Jøsang draws our attention to being clear about the target of trust [39]. He points out that a machine or a program (a rational entity) does not trust; it only implements the trust policy given by a human (a passionate entity).…”
Section: The Trust Information Modelmentioning
confidence: 99%
“…He points out that a machine or a program (a rational entity) does not trust; it only implements the trust policy given by a human (a passionate entity). On the other hand, while trusting another passionate entity concerns speculation on things such as their motives and intentions, trusting a rational entity, who only acts according to lists of commands and rules, is based on trusting its ability to withstand manipulation by a passionate entity [39]. This also implies that when placing trust in an agent, which is a rational representation of a passionate entity, i.e.…”
Section: The Trust Information Modelmentioning
confidence: 99%