Based on the rules to compare two trust scope labels,
we have
• T SL1 cannot be compared with T SL2 (or T SL3).
There is no obvious relationship between T SL1
and T SL2 (or T SL3).
• T SL2 > T SL3. It means that the trust scope of
T SL2 is less strict than that of T SL3.
In the analysis and modelling of trust relationships,
the trust scope label may be quite complicated and
the above comparison rules provide helpful tools in
making judgements.
6 CONCLUDING REMARKS
Based on the formal definition of trust relationship
with a strict mathematical structure proposed in our
previous work, in this paper, we have focused on the
modelling of trust relationships in collaborative in-
teractions in distributed environments. We have dis-
cussed different forms of trust under the our proposed
taxonomy framework. We believe that authentication
constitutes layer one of trust and it plays a foundation
role for other trust types on layer two. The hierar-
chy of layer two trust relationships proposed is based
on the nature of the four tuples of a trust relation-
ship. This hierarchy provides a bird’s eye view of the
purposes of trust relationships in the real world. The
properties of trust direction and trust symmetry have
been discussed and a set of definitions has been pro-
vided. In real implementations, these properties can
be customized and configured based on the specific
requirements. The trust scope label has been defined
under our taxonomy framework and it could be used
in the analysis of the scope and diversity of trust rela-
tionships.
The proposed properties of trust relationships and
taxonomy framework are currently being used in the
development of the overall methodology of life cycle
of trust relationships in distributed information sys-
tems. We believe that the classification of trust are
helpful for better understanding of the trust in distrib-
uted systems. We believe that the definitions about
trust direction, trust symmetry and trust scope label
provide suitable terms for the related properties and
they can be used as tools for enabling the design and
analysis of trust in collaboration of entities in real sys-
tems.
REFERENCES
Abrams, M. (1995). Trusted system concepts. In V., J. M.,
editor, Computers and Security, pages 45–56.
Abrams, M. and Joyce, M. (1995). Trusted computing up-
date. Computers and Security, 14(1):57–68.
Anderson, S. and et al (2004). Web services trust
language (ws-trust)(version 1.1). http://www-
106.ibm.com/developerworks/library/ws-trust/.
Blaze, M., Feigenbaum, J., and Keromytis, A. (1999).
KeyNote: Trust management for public-key in-
frastructures (position paper). Lecture Notes in Com-
puter Science, 1550:59–63.
Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decen-
tralized trust management. In Proceedings of IEEE
Symposium on Security and Privacy, pages 164–173.
Chu, Y. H., Feigenbaum, J., LaMacchia, B., Resnick, P., and
Strauss, M. (1997). REFEREE: Trust management for
Web applications. Computer Networks and ISDN Sys-
tems, 29(8–13):953–964.
Della-Libera, G. and et al (2002). Web services trust
language (ws-trust) (version 1.0). http://www-
106.ibm.com/developerworks/library/ws-trust/.
Ding, Y. and Petersen, H. (1995). A new approach for dele-
gation using hierarchical delegation tokens. Technical
report, University of Technology Chemnitz-Zwickau
Department of Computer Science.
Grandison, T. and Sloman, M. (Fourth Quarter, 2000). A
survey of trust in internet application. IEEE Commu-
nications Surveys.
Huhns, M. N. and Buell, D. A. (2002). Trusted autonomy.
Internet Computing, IEEE, 6(3):92–95.
Jøsang, A. (1996). The right type of trust for distributed
systems. In Proceeding of the 1996 New Security Par-
adigms Workshop. ACM.
Landauer, J., Redmond, T., and Benzel, T. (1989). Formal
policies for trusted processes. In Proceedings of the
Computer Security Foundations Workshop II, 1989,
pages 31–40.
Marsh, S. (1994). Formalising trust as a computational
concept. Phd thesis, University of Sterling.
TCSEC (1985). Trusted computer system evaluation crite-
ria. Technical report, U.S.A National Computer Secu-
rity Council. DOD standard 5200.28-STD.
Wang, Y. and Vassileva, J. (2003). Trust and reputation
model in peer-to-peer networks. In Proceedings of
Third International Conference on Peer-to-Peer Com-
puting.
Winsborough, W. H., Seamons, K. E., and et al (2000). Au-
tomated trust negotiation. In Proceedings of DARPA
Information Survivability Conference and Exposition.
Winslett, M., Yu, T., and et al (2002). Negotiating trust in
the web. IEEE Internet Computing, 6(6):30–37.
Xiong, L. and Liu, L. (2003). A reputation-based trust
model for peer-to-peer e commerce communities. In
IEEE International Conference on E-Commerce.
Zhao, W., Varadharajan, V., and Bryan, G. (2004). Mod-
elling trust relationships in distributed environments.
In Lecture Notes in Computer Science, volume 3184,
pages 40–49. Springer-Verlag.
ICEIS 2005 - INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION
336