Skip to main content

Managing Trust for Secure Active Networks

  • Conference paper
Multi-Agent Systems and Applications IV (CEEMAS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3690))

Abstract

This paper proposes a security architecture that employs trust notion to address security issues in active networks. The subjectivity of trust is discussed, and the innovative idea is that how to compute trust should be decided subjectively by an entity. Then, a general framework for a trust system is described. Finally, a flexible trust management model, which employs the features of active networks, is presented. In this model, different entities can use different methods to compute trust, and an entity can change its computing method of trust over time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Calvert, K.L.: Architectural Framework for Active Networks, version 1.0. University of Kentucky (1999)

    Google Scholar 

  2. Psounis, K.: Active Networks: Applications, Security, Safety, and Architectures. IEEE Communications Surveys 2(1) (1999)

    Google Scholar 

  3. Murphy, S.: Security Architecture for Active Nets. A.N. Security Working Group, Network Associates Laboratories (2001)

    Google Scholar 

  4. Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Meadows, C. (ed.) Proceedings of the 1996 workshop on New security paradigms, pp. 18–25. ACM Press, New York (1996)

    Chapter  Google Scholar 

  5. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems (2005) (to appear)

    Google Scholar 

  6. Liu, J.S., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation for E-businesses. In: King, D., Dennis, A.R. (eds.) Proceedings of the 35th Annual Hawaii International Conference on System Sciences, vol. 7, p. 188. IEEE Computer Society, Washington (2002)

    Google Scholar 

  8. Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, Department of Computing Sciece and Mathematics, University of Sterling (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qi, JJ., Li, ZZ. (2005). Managing Trust for Secure Active Networks. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds) Multi-Agent Systems and Applications IV. CEEMAS 2005. Lecture Notes in Computer Science(), vol 3690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559221_77

Download citation

  • DOI: https://doi.org/10.1007/11559221_77

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29046-9

  • Online ISBN: 978-3-540-31731-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics