degree associated with each path is calculated by
applying a concatenation function to the trusts along
the path, and finally those trust degrees are
combined with an aggregation function (Richardson,
Agrawal, and Domingos, 2003) (Agudo, Fernandez-
Gago, and Lopez, 2008). In this method, a trust
graph is regarded as several independent paths,
which is not so reasonable since the effect of trust
combinations at the intermediate entities is omitted.
Huang et al proposed an algorithm to make trust
aggregation in a trust network, which recursively
simplifies a more complex network to a simpler one,
by replacing multiple parallel paths into a single arc.
Each replacement is made by using connection or
combination operation (Huang and Nicol, 2009).
Huang’s algorithm and the algorithm proposed in
this paper all take the connection and the
combination operations in accordance with the
process of trust formation. However, this paper
proposes a novel idea that is to transform a graph
into an expression. The algorithm first transforms a
trust graph into a computable expression, and then
computes the expression to get a trust degree value.
The expression is not specific to any trust expression
structures and trust operators, which makes the
model more flexible.
6 CONCLUSIONS
In this paper, the meaning of trust in the context of
access control is analyzed, and a framework for
implementing trust degree based access control
(TDBAC) in social networks and an algorithm for
trust degree computing on a trust graph is proposed.
The framework shows how trust can be used to
realize fine-grained access control.
For the problem of trust degree calculation based
on a trust graph, the concepts of the formal trust
graph expression (FTE) and the computable trust
graph expression (CTE) are proposed. A virtual arc
iteration algorithm is defined for generating a FTE
from a trust graph. The FTE does not bind to any
specific trust expression structure and the
connection or combination operators. Hence, the
FTE based trust calculation method not only
simplifies trust computations on a complicated
directed graph, but also makes the calculation more
flexible and applicable.
ACKNOWLEDGEMENTS
The Work was supported by the National Science
Foundation of China under Grant No. 60573037, the
Hi-Tech Research and Development Program of
China under Grant No. 2007AA010301, and the
National Basic Research Program of China under
Grant No. 2005CB321901.
REFERENCES
Abdul-Rahman, A., 2004. A Framework for Decentralised
Trust Reasoning, PhD thesis, University of London
Agudo, I., Fernandez-Gago, C., and Lopez, J., 2008. A
Model for Trust Metrics Analysis, TrustBus, LNCS
5185, pages 28–37.
Atrf, Y., 2002. Building Trust in E-Commerce, IEEE
Internet Computing.
Blaze, M., Feigenbaum, J., Lacy, J., 1996. Decentralized
trust management, IEEE Conference on Security and
Privacy, Oakland, CA.
Fast, A., Jensen, D., and Neil Levine B., 2005. Creating
social networks to improve peer-to-peer networking.
Proceedings of the eleventh ACM SIGKDD
international conference on Knowledge discovery in
data mining, pages 568–573, NY, USA.
Gambetta, D., 1988. editor. Trust: making and breaking
cooperative relations. Basil Blackwell.
Huang, J., and Nicol, D., 2009. A Calculus of Trust and
Its Applications to PKI and Identity Management,
Proceedings of the 8th Symposium on Identity and
Trust on the Internet.
ISO, 1989. ISO 7498-2, OSI security architecture.
Jøsang, A., Hayward, R., Pope, S., 2006. Trust Network
Analysis with Subjective Logic. Proceedings of the
Australasian Computer Science Conference
(ACSC'06), Hobart.
Krishnan, R., Sandhu, R., Niu, J., Winsborough, W. H.,
2009. Formal Models for Group-Centric Secure
Information Sharing, Technical Report CS-TR-2009-
002. Department of Computer Science , The
University of Texas, San Antonio.
Lampson, B. W.,1971. Protection, Proceedings of 5th
Princeton Conf. on Information Sciences and Systems,
Princeton, pages 437-443.
Lang, B., Wang, Z., Wang, Q., 2007. Trust Representation
and Reasoning for Access Control in Large Scale
Distributed Systems, Proceedings of the Second
International Conference on Pervasive Computing
and Applications, Birbingham, England.
Richardson, M., Agrawal, R., Domingos, P., 2003. Trust
Management for the Semantic Web. Proceedings of
the International Semantic Web Conference, pages
351-368.
SECRYPT 2010 - International Conference on Security and Cryptography
48