Skip to main content

A Trust Analysis Methodology for Pervasive Computing Systems

  • Conference paper
Trusting Agents for Trusting Electronic Societies (TRUST 2004, TRUST 2003)

Abstract

We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing systems. The Trust Analysis Grid is then used to guide the design of the pervasive computing system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Huang, A., Ling, B., Ponnekanti, S.: Pervasive Computing - What is it Good For? In: Proceedings of the ACM International Workshop on Data Engineering for Wireless and Mobile Access, Seatle, WA, USA, pp. 84–91 (1999)

    Google Scholar 

  2. Falcone, R., Singh, M.P., Tan, Y.H.: Trust in Cyber-societies. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, p. 1. Springer, Heidelberg (2001)

    Google Scholar 

  3. Nixon, P., Terzis, S.: iTrust 2003. LNCS, vol. 2692. Springer, Heidelberg (2003)

    Book  MATH  Google Scholar 

  4. Dimitrakos, T., Martinelli, F.: Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Istituto di Informatica e Telematica (2003)

    Google Scholar 

  5. Hendler, J.: Agents and the Semantic Web. IEEE Intelligent Systems 16, 30–37 (2001)

    Article  Google Scholar 

  6. Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten, J., Burgelman, J.-C.: Scenarios for Ambient Intelligence in 2010. Technical report, Information Society Technologies, European Commission (2001)

    Google Scholar 

  7. IST Advisory Group: Trust, dependability, security and privacy for IST in FP6. Technical report, IST Advisory Group (2002), ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402464encfull.pdf

  8. Heather, J., Hill, D.: I’m Not Signing That! In: Dimitrakos, T., Martinelli, F. (eds.) Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), Pisa, Italy, pp. 71–81 (2003)

    Google Scholar 

  9. Ishaya, T., Mundy, D.: Trust Development and Management in Virtual Communities. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 266–276. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Rindebäck, C., Gustavsson, R.: Why Trust is Hard - Challenges in e-mediated Services. In: Proceedings of the 7th International Workshop on Trust in Agent Societies, New York, USA (2004)

    Google Scholar 

  11. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report 94–04, Carlson School of Management, University of Minnesota (1996), http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf

  12. Butler, M., Leuschel, M., Presti, S.L., Allsopp, D., Beautement, P., Booth, C., Cusack, M., Kirton, M.: Towards a Trust Analysis Framework for Pervasive Computing Scenarios. In: Proceedings of the 6th International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems, Melbourne, Australia (2003)

    Google Scholar 

  13. Bottoni, P., Costabile, M.F., Levialdi, S., Matera, M., Mussio, P.: Trusty Interaction in Visual Environments. In: Emiliani, P.L., Stephanidis, C. (eds.) Proceedings of the 6th ERCIM Workshop “User Interfaces For All” (UI4ALL), Florence, Italy, pp. 263–277 (2000)

    Google Scholar 

  14. Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237. Department of Sociology, University of Oxford (2000), Electronic edition http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf

  15. Jones, S., Morris, P.: TRUST-EC: Requirements for Trust and Confidence in E-Commerce: Report of the Workshop held in Luxembourg, April 8th − 9th. In: Technical Report EUR 18749 EN, European Communities EUR Report 2 (1999), http://dsa-isis.jrc.it/TrustEC/D1.pdf

  16. Yu, E., Cysneiros, L.M.: Designing for Privacy in a Multi-agent World. In: Falcone, R., Barber, K.S., Singh, M.P., Korba, L. (eds.) Trust, Reputation, and Security: Theories and Practice, pp. 209–223. Bologna, Italy (2002)

    Google Scholar 

  17. Tan, Y.H.: A Trust Matrix Model for Electronic Commerce. In: Nixon, P., Terzis, S. (eds.) Trust Management (First International Conference iTrust 2003), Crete, Greece, pp. 33–45 (2003)

    Google Scholar 

  18. Bændeland, G., Stølen, K.: Using Risk Analysis to Assess User Trust - A Net-Bank Scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) Trust Management (Second International Conference iTrust 2004), Oxford, United Kingdom, pp. 146–160 (2004)

    Google Scholar 

  19. Storey, N.: Safety-Critical Computer Systems. Addison-Wesley, Reading (1996)

    Google Scholar 

  20. Butler, M., Leuschel, M., Presti, S.L., Turner, P.: The Use of Formal Methods in the Analysis of Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 333–339. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Presti, S.L., Butler, M., Leuschel, M., Booth, C. (2005). A Trust Analysis Methodology for Pervasive Computing Systems. In: Falcone, R., Barber, S., Sabater-Mir, J., Singh, M.P. (eds) Trusting Agents for Trusting Electronic Societies. TRUST TRUST 2004 2003. Lecture Notes in Computer Science(), vol 3577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11532095_8

Download citation

  • DOI: https://doi.org/10.1007/11532095_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28012-5

  • Online ISBN: 978-3-540-31859-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics