Skip to main content

Implementing Credential Networks

  • Conference paper
Trust Management (iTrust 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3986))

Included in the following conference series:

Abstract

Credential networks have recently been introduced as a general model for distributed authenticity and trust management in open networks. This paper focuses on issues related to the implementation of credential networks. It presents a system called Caution, which consists of a simple language to define credential networks and an underlying machinery to perform the evaluation. The paper also describes the necessary algorithms in further details.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jonczy, J., Haenni, R.: Credential networks: a general model for distributed trust and authenticity management. In: PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 101–112 (2005)

    Google Scholar 

  2. Haenni, R.: Towards a unifying theory of logical and probabilistic reasoning. In: ISIPTA 2005, 4th International Symposium on Imprecise Probabilities and Their Applications, Pittsburgh, USA, pp. 193–202 (2005)

    Google Scholar 

  3. Haenni, R., Kohlas, J., Lehmann, N.: Probabilistic argumentation systems. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, Netherlands. Algorithms for Uncertainty and Defeasible Reasoning, vol. 5, pp. 221–288. Kluwer Academic Publishers, Dordrecht (2000)

    Chapter  Google Scholar 

  4. Zimmermann, P.R.: PGP User’s Guide. Special Topics, vol. 2 (1994)

    Google Scholar 

  5. Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 324–350. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  6. Kohlas, R., Maurer, U.: Confidence valuation in a public-key infrastructure based on uncertain evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 93–112. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Marchesini, J., Smith, S.W.: Modeling public key infrastructures in the real world. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 118–134. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Jøsang, A.: An algebra for assessing trust in certification chains. In: NDSS 1999: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA (1999)

    Google Scholar 

  9. Mahoney, G., Myrvold, W., Shoja, G.C.: Generic reliability trust model. In: Ghorbani, A., Marsh, S. (eds.) PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 113–120 (2005)

    Google Scholar 

  10. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  11. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp. 185–210. Springer, London (1999)

    Chapter  Google Scholar 

  12. Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information and System Security 2(2), 138–158 (1999)

    Article  Google Scholar 

  13. Haenni, R.: Cost-bounded argumentation. International Journal of Approximate Reasoning 26(2), 101–127 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  14. Haenni, R.: Anytime argumentative and abductive reasoning. Soft Computing – A Fusion of Foundations, Methodologies and Applications 8(2), 142–149 (2003)

    Google Scholar 

  15. Jonczy, J.: Kredentialnetze: ein allgemeines Modell für den Umgang mit Vertrauen und Authentizität in verteilten Netzwerken. Master’s thesis, University of Fribourg, Switzerland (2005)

    Google Scholar 

  16. Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jonczy, J., Haenni, R. (2006). Implementing Credential Networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_13

Download citation

  • DOI: https://doi.org/10.1007/11755593_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34295-3

  • Online ISBN: 978-3-540-34297-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics