Abstract
Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that define the measure of security of such models. This paper discusses the issues involved in evaluating these models, using the SECURE trust-based framework as a case study.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Spamassassin, http://spamassassin.apache.org
Anderson, R.J.: Security Engineering — A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2001)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. Technical Report 96-17, DIMACS, June 28 (1996)
Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive 2(3), 52–61 (2003)
Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Trust-based access control model. EU IST-FET SECURE Project Deliverable (September 2004)
Douceur, J.R., Donath, J.S.: The Sybil Attack, February 22 (2002)
Garcia-Molina, H., Schlosser, M.T., Kamvar, S.D.: The EigenTrust Algorithm for Reputation Management in P2P Networks, November 18 (2002)
Gong, L.: Inside Java 2 Platform Security. The Java Series. Addison Wesley, Reading (1999)
Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human Experiments in Trust Dynamics. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 206–220. Springer, Heidelberg (2004)
Kindberg, T., Sellen, A., Geelhoed, E.: Security and Trust in Mobile Interactions: A Study of Users’ Perceptions and Reasoning. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 196–213. Springer, Heidelberg (2004)
Lampson, B., Rivest, R.L.: SDSI – A Simple Distributed Security Infrastructure. Technical report, July 26 (1996)
Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)
Massa, P., Bhattacharjee, B.: Using Trust in Recommender Systems: an Experimental Analysis. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)
Seigneur, J.-M., Dimmock, N., Bryce, C., Jensen, C.: Combating SPAM with Trustworthy Email Addresses. In: Proceedings of the 2nd International Conference on Privacy, Security and Trust, New Brunswick, June 9-19, pp. 228–229. ACM Press, New York (2004)
Seigneur, J.-M., Jensen, C.D.: Privacy Recovery with Disposable Email Addresses. IEEE Security & Privacy 1(6), 35–39 (2003)
Twigg, A., Dimmock, N.: Attack Resistance of Computational Trust Models. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises — Enterprise Security, June 2003, pp. 281–282 (2003)
Wagealla, W., Terzis, S., English, C., Nixon, P.: Simulation-based Assessment and Validation for the SECURE Collaboration Model. Technical report, University of Strathcylde (2005)
Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer Ecommerce Communities. In: Proceedings of the 4th ACM Conference on Electronic Commerce EC 2003, June 9-12, pp. 228–229. ACM Press, New York (2003)
Zannone, N.: A Survey on Trust Management Languages. Technical report, University of Verona, August 01 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bryce, C., Dimmock, N., Krukow, K., Seigneur, JM., Cahill, V., Wagealla, W. (2005). Towards an Evaluation Methodology for Computational Trust Systems. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_20
Download citation
DOI: https://doi.org/10.1007/11429760_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26042-4
Online ISBN: 978-3-540-32040-1
eBook Packages: Computer ScienceComputer Science (R0)