Skip to main content

Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms

  • Conference paper
Book cover Trust Management (iTrust 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3477))

Included in the following conference series:

Abstract

This paper reviews trust from both a social and technological perspective and proposes a distinction between persistent and dynamic trust. Furthermore, this analysis is applied within the context of trusted computing technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ACM, Special Issue on Trusting Technology. Communications of the ACM 43(12) (December 2000)

    Google Scholar 

  2. Anderson, R.: Trusted Computing’ Frequently Asked Questions, v1.1 (August 2003), Available via http://www.cl.cam.ac.uk/~rja14

  3. Blaze, M., Ioannidid, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System: Applications and Future Directions. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 284–300. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Castelfranchi, C., Tan, Y.-H. (eds.): Trust and Deception in Virtual Societies. Kluwer Academic Publishers, Dordrecht (2001)

    Google Scholar 

  5. Cheskin: Research and Studio Archetype. eCommerce Trust Study, University College London (January 1999), Available via http://www.sapient.com/cheskin/

  6. Egger, F.N.: Increasing Consumers’ Confidence in Electronic Commerce through Human Factors Engineering, MSc project, University College London (1998)

    Google Scholar 

  7. Friedman, B., Kahn Jr., P.H., Howe, D.C.: Trust Online. Communications of the ACM 43(12), 34–40 (2000)

    Article  Google Scholar 

  8. Giff, S.: The Influence of Metaphor, Smart Cards and Interface Dialogue on Trust in eCommerce, MSc project, University College London (2000)

    Google Scholar 

  9. Grandison, T., Sloman, M.: Trust Management Tools for Internet Applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 91–107. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Intel, LaGrande Technology Architectural Overview (September 2003), Available via http://www.intel.com/technology/security/downloads/LT_Arch_Overview.pdf

  11. ISO/IEC 15408 (all parts), Information technology – Open Systems Interconnection – Evaluation criteria for information technology security, International Organization for Standardization, Geneva, Switzerland (1999)

    Google Scholar 

  12. Jupiter, Trust Online: Barrier Today, Strength Tomorrow, Research Report, April 4 (2001)

    Google Scholar 

  13. Kumar, N.: The Power of Trust in Manufacturer-Retailer Relationships. Harvard Business Review, 92–106 (November-December 1996)

    Google Scholar 

  14. Luhmann, N.: Trust as a Reduction of Complexity, Trust and Power: Two works by Niklas Luhmann, pp. 24–31. John Wiley & Sons, New York (1979)

    Google Scholar 

  15. Microsoft, Next-Generation Secure Computing Base home page, http://www.microsoft.com/resources/ngscb

  16. Nielsen, J.: Trust or Bust: Communicating Trustworthiness in Web Design. Jacob Nielsen’s Alertbox (1999), Available via http://www.useit.com/alertbox/990307.html

  17. Nissenbaum, H.: Can Trust be Secured Online? A theoretical perspective. Etica e Politica 2 (December 1999)

    Google Scholar 

  18. Osterwalder, D.: Trust Through Evaluation and Certification? Social Science Computer Review 19(1), 32–46 (2001)

    Article  Google Scholar 

  19. Pearson, S.: A Trusted Method for Self-profiling in e-Commerce. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 177–193. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305–320. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. PRIME: Privacy and Identity Management for Europe, European RTD Integrated Project under the FP6/IST Programme (2004), http://www.prime-project.eu.org/

  22. Rousseau, D., Sitkin, S., Burt, R., Camerer, C.: Not so Different after All: a Cross-discipline View of Trust. Academy of Management Review 23(3), 393–404 (1998)

    Google Scholar 

  23. Simmel, G.: Soziologie, 5th edn., Berlin, p. 263 (1968)

    Google Scholar 

  24. Trusted Computing Group, TCG Main Specification, Version 1.1b (2003), Available via http://www.trustedcomputinggroup.org

  25. Trusted Computing Group, TCG Specification Architecture Overview, Version 1.2 (2004), Available via http://www.trustedcomputinggroup.org

  26. Trusted Computing Group, TCG TPM Specification, Version 1.2 (2003), Available via http://www.trustedcomputinggroup.org

  27. Yan, Z., Cofta, P.: A mechanism for trust sustainability among trusted computing platforms. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 11–19. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  28. Yung, M.: Trusted computing platforms: The good, the bad, and the ugly. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 250–254. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pearson, S., Mont, M.C., Crane, S. (2005). Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_24

Download citation

  • DOI: https://doi.org/10.1007/11429760_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26042-4

  • Online ISBN: 978-3-540-32040-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics