PC
S
1
S
2
τ(C,S
1
,c
1
,λ
1
,ι
1
,ε
1
, id
1
, s
1
)
τ(C,S
2
,c
1
,λ
1
,ι
2
,ε
2
, id
1
, s
1
)
τ(C,P,c
2
,λ
1
,ι
3
,ε
3
, id
1
, s
1
)
c
1
= (forward,{sensitive,recommendation})
c
2
= (generate,{sensitive})
λ
1
= (normal, partial)
ι
1
= [1,10] , ι
2
= [1,15] , ι
3
= [1,8]
s
1
= OK
ε
1
= {(authentication, =, certificate,certificate, ev
1
), (reliability, >=, 0.97, 0.95, ev
2
)}
ε
2
= {(authentication, =, certificate,certificate, ev
1
), (reliability, >=, 0.95, 0.95, ev
2
)}
ε
3
= {(authentication, =, certificate,certificate, ev
1
), (reliability, >=, 0.90, 0.80, ev
2
)}
Figure 3: Trust Relation Graph.
First, the trust aggregation for the same context c
1
will take place for trustees S1 and S2. The result will
be τ(γ
C
, δ
S1,S2
, c
1
, λ
1
, ι
k
, ε
k
, id
1
, s
OK
) , with i
k
=(1,10)
and ε
k
={(authentication, =, certificate,certificate,
ev1), (reliability, >, average(0.95,0.97), aver-
age(0.95,0.95), ev2)}. Then, the end-to-end trust
assessment will take place between the new trust
relationship τ(γ
C
, δ
S1,S2
, c
1
, λ
1
, ι
k
, ε
k
, id
1
, s
OK
) and
τ(γ
C
, δ
P
, c
2
, λ
1
, ι
3
, ε
3
, id
1
, s
OK
) . In this case,
τ(γ
C
, δ
P,S1,S2
, c
1,2
, λ
1
, ι
m
, ε
m
, id
1
, s
OK
) , with i
m
=(1,8)
and ε
m
={(authentication, =, certificate,certificate,
ev1), (reliability, >, average(0.90,0.96), aver-
age(0.80,0.95), ev2)}.
4 RELATED WORK
In recent years, researchers have investigated various
definitions of trust, modeling trust and its manage-
ment (Vacca, 2004; Winslett et al., 2002; Herzberg
et al., 2000; Group, 2004; Grandison, 2001; Blaze
et al., 1996; Chu et al., 1997; Blaze et al., 1998; Zim-
mermann, 1995; Marsh, 1994; Josang, 1997; Josang
et al., 2006; Abdul-Rahman and Hailes, 2000). Start-
ing with one of the early and widely known trust mod-
els, the PGP trust model (Zimmermann, 1995) creates
an informal web of trust which is used for authentica-
tion purposes. A recent survey of contemporary trust
management systems is compiled by Grandison and
Sloman (Grandison and Sloman, 2000), who point out
the limitations of those solutions as they mostly ad-
dress access control issues rather than the more gen-
eral analysis of trust. KeyNote (Blaze et al., 1998)
and PolicyMaker (Blaze et al., 1996), for instance, are
primarily concerned with security issues (authentica-
tion and access control). A solution to more general
trust relationships is proposed by SULTAN (Grandi-
son and Sloman, 2000), a trust management model
that uses a logic-oriented language to specify trust. In
addition to the practical approaches to trust, there are
formal trust models that describe more general trust
factors. The Marsh (Marsh, 1994) logic-based frame-
work uses formal representation to capture the seman-
tics of the social paradigms of trust whereas Josang’s
subjective logic (Josang, 1997; Josang et al., 2006) is
another formal model that uses beliefs as the basis for
trust.
Unlike other approaches, our model derives end-
to-end trust assessments without using transitive in-
direct trust explicitly in the derivations. The seman-
tics of indirect trust are captured in the form of fine-
grained recommendations that are considered to be an
evidence type; the weight of this evidence on the over-
all trust assessment, like any other evidence type, is
based on the trustor-recommender existing trust rela-
tionship. In this case, the trust relationship context
could be ”recommending” whereas the activity iden-
tifier could be the interaction identifier of the partic-
ular recommendation information flow. In addition,
our model extends the traditional concept of trust con-
ditions into more expressive expectations, which in-
clude not only expected values for particular prop-
erties but also covering, aggregating, and triggering
mechanisms that manipulate the observed value.
5 CONCLUSIONS
This paper presents a new trust paradigm and asso-
ciated formalisms, devised to support dynamic and
composable trust suitable for collaborative activities.
Dynamic and composable trust is essential for topolo-
gies where interactions are dynamic and they almost
always involve the collaboration of multiple entities
to disseminate data from its source to its destination.
In this setting, dynamic trust enables the specifica-
tion and management of trust relationships to change
over the operational lifecycle of the activity as rele-
vant conditions that affect trust change. Composable
trust allows end-to-end trust assessment for the entire
activity, where multiple trust relationships are exam-
ined in order to derive trust for the activity. We also
presented an intuitive and practical way to manage
end-to-end trust assessment for a particular activity,
including explicit consideration of expectations and
their violations.
REFERENCES
Abdul-Rahman, A. and Hailes, S. (1997). A distributed
trust model. In Proceedings of the ACM New Secu-
rity Paradigms Workshop, pages 48–60.
Abdul-Rahman, A. and Hailes, S. (2000). Supporting trust
in virtual communities. In Proceedings of the 33th
Hawaii International Conference on System Sciences
(HICSS), pages 1769–1777, Maui, Hawaii.
SECRYPT 2008 - International Conference on Security and Cryptography
552