Abstract
We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing systems. The Trust Analysis Grid is then used to guide the design of the pervasive computing system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Huang, A., Ling, B., Ponnekanti, S.: Pervasive Computing - What is it Good For? In: Proceedings of the ACM International Workshop on Data Engineering for Wireless and Mobile Access, Seatle, WA, USA, pp. 84–91 (1999)
Falcone, R., Singh, M.P., Tan, Y.H.: Trust in Cyber-societies. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, p. 1. Springer, Heidelberg (2001)
Nixon, P., Terzis, S.: iTrust 2003. LNCS, vol. 2692. Springer, Heidelberg (2003)
Dimitrakos, T., Martinelli, F.: Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Istituto di Informatica e Telematica (2003)
Hendler, J.: Agents and the Semantic Web. IEEE Intelligent Systems 16, 30–37 (2001)
Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten, J., Burgelman, J.-C.: Scenarios for Ambient Intelligence in 2010. Technical report, Information Society Technologies, European Commission (2001)
IST Advisory Group: Trust, dependability, security and privacy for IST in FP6. Technical report, IST Advisory Group (2002), ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402464encfull.pdf
Heather, J., Hill, D.: I’m Not Signing That! In: Dimitrakos, T., Martinelli, F. (eds.) Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), Pisa, Italy, pp. 71–81 (2003)
Ishaya, T., Mundy, D.: Trust Development and Management in Virtual Communities. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 266–276. Springer, Heidelberg (2004)
Rindebäck, C., Gustavsson, R.: Why Trust is Hard - Challenges in e-mediated Services. In: Proceedings of the 7th International Workshop on Trust in Agent Societies, New York, USA (2004)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report 94–04, Carlson School of Management, University of Minnesota (1996), http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf
Butler, M., Leuschel, M., Presti, S.L., Allsopp, D., Beautement, P., Booth, C., Cusack, M., Kirton, M.: Towards a Trust Analysis Framework for Pervasive Computing Scenarios. In: Proceedings of the 6th International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems, Melbourne, Australia (2003)
Bottoni, P., Costabile, M.F., Levialdi, S., Matera, M., Mussio, P.: Trusty Interaction in Visual Environments. In: Emiliani, P.L., Stephanidis, C. (eds.) Proceedings of the 6th ERCIM Workshop “User Interfaces For All” (UI4ALL), Florence, Italy, pp. 263–277 (2000)
Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237. Department of Sociology, University of Oxford (2000), Electronic edition http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
Jones, S., Morris, P.: TRUST-EC: Requirements for Trust and Confidence in E-Commerce: Report of the Workshop held in Luxembourg, April 8th − 9th. In: Technical Report EUR 18749 EN, European Communities EUR Report 2 (1999), http://dsa-isis.jrc.it/TrustEC/D1.pdf
Yu, E., Cysneiros, L.M.: Designing for Privacy in a Multi-agent World. In: Falcone, R., Barber, K.S., Singh, M.P., Korba, L. (eds.) Trust, Reputation, and Security: Theories and Practice, pp. 209–223. Bologna, Italy (2002)
Tan, Y.H.: A Trust Matrix Model for Electronic Commerce. In: Nixon, P., Terzis, S. (eds.) Trust Management (First International Conference iTrust 2003), Crete, Greece, pp. 33–45 (2003)
Bændeland, G., Stølen, K.: Using Risk Analysis to Assess User Trust - A Net-Bank Scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) Trust Management (Second International Conference iTrust 2004), Oxford, United Kingdom, pp. 146–160 (2004)
Storey, N.: Safety-Critical Computer Systems. Addison-Wesley, Reading (1996)
Butler, M., Leuschel, M., Presti, S.L., Turner, P.: The Use of Formal Methods in the Analysis of Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 333–339. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Presti, S.L., Butler, M., Leuschel, M., Booth, C. (2005). A Trust Analysis Methodology for Pervasive Computing Systems. In: Falcone, R., Barber, S., Sabater-Mir, J., Singh, M.P. (eds) Trusting Agents for Trusting Electronic Societies. TRUST TRUST 2004 2003. Lecture Notes in Computer Science(), vol 3577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11532095_8
Download citation
DOI: https://doi.org/10.1007/11532095_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28012-5
Online ISBN: 978-3-540-31859-0
eBook Packages: Computer ScienceComputer Science (R0)