Abstract
Trust negotiation represents a suitable approach for building trust in online environments, where the interacting entities are anonymous. It covers important criteria on security and privacy. In this work, we propose a method for implementing our model specification that handles trust negotiation. We define the structure of the trust negotiation module that is a standalone unit capable of negotiating on its own. It may be included to any software by its defined interfaces. We realise our method with a ride-sharing scenario and four trust negotiation strategies that we apply in order to validate our design and implementation. We propose a solution that is fully customisable based on different requirements. The proposal provides guidelines for developers in the process of including trust negotiation into their software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gambetta, D.: Can we trust trust? Trust: Making Breaking Coop. Relat. 13, 213–238 (1990)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. DARPA Information Survivability Conference and Exposition. In: DISCEX ’00 Proceedings, vol. 1, pp. 88–102 (2000)
Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp. 92–103, IEEE (2002)
Kolar, M., Fernandez-Gago, C., Lopez, J.: Policy languages and their suitability for trust negotiation. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 69–84. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95729-6_5
Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 146–155 (2001)
Moyano, F.: Trust engineering framework for software services. Universidad de Málaga, Lenguajes y Ciencias de la Computación. PhD thesis (2015)
Winslett, M., et al.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30–37 (2002)
Bonatti, P., De Coi, J.L., Olmedilla, D., Sauro, L.: A rule-based trust negotiation system. IEEE Trans. Knowl. Data Eng. 22(11), 1507–1520 (2010)
Hess, A., Holt, J., Jacobson, J., Seamons, K.E.: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3), 428–456 (2004)
Guo, S., Jiang, W.: An adaptive automated trust negotiation model and algorithm. In: International Conference on Communications and Intelligence Information Security, Nanning, pp. 130–134. IEEE (2010)
Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 129–143. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_10
Ruparelia, N.B.: Software development lifecycle models. ACM SIGSOFT Softw. Eng. Notes 35(3), 8–13 (2010)
Driver, M., Gaehtgens, F., O’Neill, M.: Managing digital trust in the software development life cycle. ID G00326944, Gartner (2017)
Kolar, M., Fernandez-Gago, C., Lopez, J.: A model specification for the design of trust negotiations. Comput. Secur. 84, 288–300 (2019)
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: TROPOS: an agent-oriented software development methodology. Auton. Agent Multi-Agent Syst. 8(3), 203–236 (2004). https://doi.org/10.1023/B:AGNT.0000018806.20944.ef
Casey, V., Richardson, I.: Implementation of global software development: a structured approach. Softw. Process: Improv. Pract. 14(5), 247–262 (2009)
Ilieva, S., Ivanov, P., Stefanova, E.: Analyses of an agile methodology implementation. In: Proceedings of the 30th Euromicro Conference, pp. 326–333. IEEE (2004)
Theodorakopoulos, G., Baras, J.S.: Trust evaluation in Ad-Hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe ’04), New York, USA, pp. 1–10. ACM (2004)
Acknowledgements
This research has been partially supported by the Spanish Ministry of Science and Innovation through the project SecurEdge (PID2019-110565RB-I00) and by the European Commission through the project EU H2020-SU-ICT-03–2018 Project No. 830929 CyberSec4Europe (cybersec4europe.eu).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A Optimistic Strategy
 | Driver | Trust Negotiation | Passenger | ||||
---|---|---|---|---|---|---|---|
 | Required trust: 6 |  | Required trust: 12 | ||||
Exposure limit: 10 | Exposure limit: 8 | ||||||
Step | Trust | Exposure | Â | Â | Â | Trust | Exposure |
1 | 0 | 0 | \(\longleftarrow \) | request: phone number | \(\longleftarrow \) | 0 | 0 |
2 | 0 | 1 | \(\longrightarrow \) | disclosure: phone number | \(\longrightarrow \) | 3 | 0 |
3 | 0 | 1 | \(\longrightarrow \) | request: phone number | \(\longrightarrow \) | 3 | 0 |
4 | 2 | 1 | \(\longleftarrow \) | disclosure: phone number | \(\longleftarrow \) | 3 | 3 |
5 | 2 | 1 | \(\longleftarrow \) | request: price list | \(\longleftarrow \) | 3 | 3 |
6 | 2 | 2 | \(\longrightarrow \) | disclosure: price list | \(\longrightarrow \) | 5 | 3 |
7 | 2 | 2 | \(\longrightarrow \) | request: address | \(\longrightarrow \) | 5 | 3 |
8 | 5 | 2 | \(\longleftarrow \) | disclosure: address | \(\longleftarrow \) | 5 | 6 |
9 | 5 | 2 | \(\longleftarrow \) | request: driving history | \(\longleftarrow \) | 5 | 6 |
10 | 5 | 6 | \(\longrightarrow \) | disclosure: driving history | \(\longrightarrow \) | 8 | 6 |
11 | 5 | 6 | \(\longrightarrow \) | request: luggage info | \(\longrightarrow \) | 8 | 6 |
12 | 6 | 6 | \(\longleftarrow \) | disclosure: luggage info | \(\longleftarrow \) | 8 | 7 |
13 | 6 | 6 | \(\longleftarrow \) | request: space info | \(\longleftarrow \) | 8 | 7 |
14 | 6 | 7 | \(\longrightarrow \) | disclosure: space info | \(\longrightarrow \) | 10 | 7 |
15 | 6 | 7 | \(\longleftarrow \) | request: address | \(\longleftarrow \) | 10 | 7 |
16 | 6 | 7 | \(\longrightarrow \) | disclosure denied | \(\longrightarrow \) | 10 | 7 |
17 | 6 | 7 | \(\longleftarrow \) | request: latest ride | \(\longleftarrow \) | 10 | 7 |
18 | 6 | 8 | \(\longrightarrow \) | disclosure: latest ride | \(\longrightarrow \) | 12 | 7 |
19 | 6 | 8 | \(\longleftarrow \) | successful termination | \(\longrightarrow \) | 12 | 7 |
Appendix B Pessimistic Strategy
 | Driver | Trust Negotiation | Passenger | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
 | Required trust: 6 |  | Required trust: 12 | ||||||||
Exposure limit: 10 | Exposure limit: 9 | ||||||||||
Step | Trust | Exp | Unb.Level | Unb.Limit | Â | Â | Â | Trust | Exp | Unb.Level | Unb.Limit |
1 | 0 | 0 | 0 | 2 | \(\longleftarrow \) | request: phone number | \(\longleftarrow \) | 0 | 0 | 0 | 0 |
2 | 0 | 1 | 1 | 2 | \(\longrightarrow \) | disclosure: phone number | \(\longrightarrow \) | 2 | 0 | -2 | 0 |
3 | 0 | 1 | 1 | 2 | \(\longrightarrow \) | request: phone number | \(\longrightarrow \) | 2 | 0 | -2 | 0 |
4 | 0 | 1 | 1 | 2 | \(\longleftarrow \) | disclosure denied | \(\longleftarrow \) | 2 | 0 | -2 | 0 |
5 | 0 | 1 | 1 | 2 | \(\longrightarrow \) | request: e-mail | \(\longrightarrow \) | 2 | 0 | -2 | 0 |
6 | 1 | 1 | 0 | 2 | \(\longleftarrow \) | disclosure: e-mail | \(\longleftarrow \) | 2 | 2 | 0 | 0 |
7 | 1 | 1 | 0 | 2 | \(\longleftarrow \) | request: price list | \(\longleftarrow \) | 2 | 2 | 0 | 0 |
8 | 1 | 2 | 1 | 2 | \(\longrightarrow \) | disclosure: price list | \(\longrightarrow \) | 4 | 2 | -2 | 2 |
9 | 1 | 2 | 1 | 2 | \(\longrightarrow \) | request: address | \(\longrightarrow \) | 4 | 2 | -2 | 2 |
10 | 1 | 2 | 1 | 2 | \(\longleftarrow \) | disclosure denied | \(\longleftarrow \) | 4 | 2 | -2 | 2 |
11 | 1 | 2 | 1 | 2 | \(\longrightarrow \) | request: phone number | \(\longrightarrow \) | 4 | 2 | -2 | 2 |
12 | 3 | 2 | -1 | 2 | \(\longleftarrow \) | disclosure: phone number | \(\longleftarrow \) | 4 | 5 | 1 | 2 |
13 | 3 | 2 | -1 | 2 | \(\longleftarrow \) | request: driving history | \(\longleftarrow \) | 4 | 5 | 1 | 2 |
14 | 3 | 2 | -1 | 2 | \(\longrightarrow \) | disclosure denied | \(\longrightarrow \) | 4 | 5 | 1 | 2 |
15 | 3 | 2 | -1 | 2 | \(\longleftarrow \) | request: space info | \(\longleftarrow \) | 4 | 5 | 1 | 2 |
16 | 3 | 3 | 0 | 2 | \(\longrightarrow \) | disclosure: space info | \(\longrightarrow \) | 6 | 5 | -1 | 2 |
17 | 3 | 3 | 0 | 2 | \(\longrightarrow \) | request: address | \(\longrightarrow \) | 6 | 5 | -1 | 2 |
18 | 3 | 3 | 0 | 2 | \(\longleftarrow \) | disclosure denied | \(\longleftarrow \) | 6 | 5 | -1 | 2 |
19 | 3 | 3 | 0 | 2 | \(\longrightarrow \) | request: luggage info | \(\longrightarrow \) | 6 | 5 | -1 | 2 |
20 | 4 | 3 | -1 | 4 | \(\longleftarrow \) | disclosure: luggage info | \(\longleftarrow \) | 6 | 6 | 0 | 2 |
21 | 4 | 3 | -1 | 4 | \(\longleftarrow \) | request: latest ride | \(\longleftarrow \) | 6 | 6 | 0 | 2 |
22 | 4 | 4 | 0 | 4 | \(\longrightarrow \) | disclosure: latest ride | \(\longrightarrow \) | 8 | 6 | -2 | 4 |
23 | 4 | 4 | 0 | 4 | \(\longrightarrow \) | request: address | \(\longrightarrow \) | 8 | 6 | -2 | 4 |
24 | 7 | 4 | -3 | 5 | \(\longleftarrow \) | disclosure: address | \(\longleftarrow \) | 8 | 9 | 1 | 4 |
25 | 7 | 4 | -3 | 5 | \(\longleftarrow \) | request: driving history | \(\longleftarrow \) | 8 | 9 | 1 | 4 |
26 | 7 | 8 | 1 | 5 | \(\longrightarrow \) | disclosure: driving history | \(\longrightarrow \) | 11 | 9 | -2 | 4 |
27 | 7 | 8 | 1 | 5 | \(\longleftarrow \) | request: address | \(\longleftarrow \) | 11 | 9 | -2 | 4 |
28 | 7 | 10 | 3 | 5 | \(\longrightarrow \) | disclosure: address | \(\longrightarrow \) | 13 | 9 | -4 | 4 |
29 | 7 | 10 | 3 | 5 | \(\longleftarrow \) | successful termination | \(\longrightarrow \) | 13 | 9 | -4 | 4 |
Appendix C Balanced Strategy
 | Driver | Trust Negotiation | Passenger | ||||||
---|---|---|---|---|---|---|---|---|---|
 | Required trust: 6 |  | Required trust: 12 | ||||||
Exposure limit: 10 | Exposure limit: 8 | ||||||||
Required conf.: 0.8 | Required conf.: 0.6 | ||||||||
Step | Trust | Exp | Conf | Â | Â | Â | Trust | Exp | Conf. |
1 | 0 | 0 | 0 | \(\longleftarrow \) | request: phone number | \(\longleftarrow \) | 0 | 0 | 0 |
2 | 0 | 1 | 0 | \(\longrightarrow \) | disclosure: phone number | \(\longrightarrow \) | 3 | 0 | 0.6 |
3 | 0 | 1 | 0 | \(\longrightarrow \) | request: phone number | \(\longrightarrow \) | 3 | 0 | 0.6 |
4 | 2 | 1 | 0.7 | \(\longleftarrow \) | disclosure: phone number | \(\longleftarrow \) | 3 | 3 | 0.6 |
5 | 2 | 1 | 0.7 | \(\longleftarrow \) | request: price list | \(\longleftarrow \) | 3 | 3 | 0.6 |
6 | 2 | 2 | 0.7 | \(\longrightarrow \) | disclosure: price list | \(\longrightarrow \) | 5 | 3 | 0.6 |
7 | 2 | 2 | 0.7 | \(\longrightarrow \) | request: address | \(\longrightarrow \) | 5 | 3 | 0.6 |
8 | 5 | 2 | 0.88 | \(\longleftarrow \) | disclosure: address | \(\longleftarrow \) | 5 | 6 | 0.6 |
9 | 5 | 2 | 0.88 | \(\longleftrightarrow \) | authority: confirmed | Â | 5 | 6 | 0.6 |
10 | 5 | 2 | 0.88 | \(\longleftarrow \) | request: driving history | \(\longleftarrow \) | 5 | 6 | 0.6 |
11 | 5 | 6 | 0.88 | \(\longrightarrow \) | disclosure: driving history | \(\longrightarrow \) | 8 | 6 | 0.75 |
12 | 5 | 6 | 0.88 | Â | authority: confirmed | \(\longleftrightarrow \) | 8 | 6 | 0.75 |
13 | 5 | 6 | 0.88 | \(\longrightarrow \) | request: luggage info | \(\longrightarrow \) | 8 | 6 | 0.75 |
14 | 6 | 6 | 0.85 | \(\longleftarrow \) | disclosure: luggage info | \(\longleftarrow \) | 8 | 7 | 0.75 |
15 | 6 | 6 | 0.85 | \(\longleftarrow \) | request: space info | \(\longleftarrow \) | 8 | 7 | 0.75 |
16 | 6 | 7 | 0.85 | \(\longrightarrow \) | disclosure: space info | \(\longrightarrow \) | 10 | 7 | 0.72 |
17 | 6 | 7 | 0.85 | \(\longleftarrow \) | request: address | \(\longleftarrow \) | 10 | 7 | 0.72 |
18 | 6 | 9 | 0.85 | \(\longrightarrow \) | disclosure: address | \(\longrightarrow \) | 12 | 7 | 0.77 |
19 | 6 | 9 | 0.85 | Â | authority: confirmed | \(\longleftrightarrow \) | 12 | 7 | 0.77 |
20 | 6 | 9 | 0.85 | \(\longleftarrow \) | successful termination | \(\longrightarrow \) | 12 | 7 | 0.77 |
Appendix D Improved Balanced Strategy
 | Driver | Trust Negotiation | Passenger | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
 | Required trust: 0.6 |  | Required trust: 0.75 | ||||||||
Exposure limit: 0.8 | Exposure limit: 0.55 | ||||||||||
St | Trust | Exp | Conf | TI | Â | Â | Â | Trust | Exp | Conf | TI |
1 | 0 | 0 | 0 | \(<0, 1>\) | \(\longleftarrow \) | req: phone number | \(\longleftarrow \) | 0 | 0 | 0 | \(<0, 1>\) |
2 | 0 | 0.05 | 0 | \(<0, 1>\) | \(\longrightarrow \) | dis: phone number | \(\longrightarrow \) | 0.15 | 0 | 0.6 | \(<0.09, 0.49>\) |
3 | 0 | 0.05 | 0 | \(<0, 1>\) | \(\longrightarrow \) | req: phone number | \(\longrightarrow \) | 0.15 | 0 | 0.6 | \(<0.09, 0.49>\) |
4 | 0.20 | 0.05 | 0.7 | \(<0.14, 0.44>\) | \(\longleftarrow \) | dis: phone number | \(\longleftarrow \) | 0.15 | 0.15 | 0.6 | \(<0.09, 0.49>\) |
5 | 0.20 | 0.05 | 0.7 | \(<0.14, 0.44>\) | \(\longleftarrow \) | req: price list | \(\longleftarrow \) | 0.15 | 0.15 | 0.6 | \(<0.09, 0.49>\) |
6 | 0.20 | 0.15 | 0.7 | \(<0.14, 0.44>\) | \(\longrightarrow \) | dis: price list | \(\longrightarrow \) | 0.30 | 0.15 | 0.6 | \(<0.18, 0.58>\) |
7 | 0.20 | 0.15 | 0.7 | \(<0.14, 0.44>\) | \(\longrightarrow \) | req: address | \(\longrightarrow \) | 0.30 | 0.15 | 0.6 | \(<0.18, 0.58>\) |
8 | 0.50 | 0.15 | 0.88 | \(<0.44, 0.56>\) | \(\longleftarrow \) | dis: address | \(\longleftarrow \) | 0.30 | 0.30 | 0.6 | \(<0.18, 0.58>\) |
9 | 0.50 | 0.15 | 0.88 | \(<0.44, 0.56>\) | \(\longleftrightarrow \) | auth: confirmed | Â | 0.30 | 0.30 | 0.6 | \(<0.18, 0.58>\) |
10 | 0.50 | 0.15 | 0.88 | \(<0.44, 0.56>\) | \(\longleftarrow \) | req: driving history | \(\longleftarrow \) | 0.30 | 0.30 | 0.6 | \(<0.18, 0.58>\) |
11 | 0.50 | 0.35 | 0.88 | \(<0.44, 0.56>\) | \(\longrightarrow \) | dis: driving history | \(\longrightarrow \) | 0.55 | 0.30 | 0.78 | \(<0.43, 0.65>\) |
12 | 0.50 | 0.35 | 0.88 | \(<0.44, 0.56>\) | Â | auth: confirmed | \(\longleftrightarrow \) | 0.55 | 0.30 | 0.78 | \(<0.43, 0.65>\) |
13 | 0.50 | 0.35 | 0.88 | \(<0.44, 0.56>\) | \(\longrightarrow \) | req: luggage info | \(\longrightarrow \) | 0.55 | 0.30 | 0.78 | \(<0.43, 0.65>\) |
14 | 0.60 | 0.35 | 0.85 | \(<0.51, 0.66>\) | \(\longleftarrow \) | dis: luggage info | \(\longleftarrow \) | 0.55 | 0.35 | 0.78 | \(<0.43, 0.65>\) |
15 | 0.60 | 0.35 | 0.85 | \(<0.51, 0.66>\) | \(\longleftarrow \) | req: space info | \(\longleftarrow \) | 0.55 | 0.35 | 0.78 | \(<0.43, 0.65>\) |
16 | 0.60 | 0.45 | 0.85 | \(<0.51, 0.66>\) | \(\longrightarrow \) | dis: space info | \(\longrightarrow \) | 0.65 | 0.35 | 0.75 | \(<0.49, 0.74>\) |
17 | 0.60 | 0.45 | 0.85 | \(<0.51, 0.66>\) | \(\longrightarrow \) | req: e-mail | \(\longrightarrow \) | 0.65 | 0.35 | 0.75 | \(<0.49, 0.74>\) |
18 | 0.70 | 0.45 | 0.83 | \(<0.58, 0.75>\) | \(\longleftarrow \) | dis: e-mail | \(\longleftarrow \) | 0.65 | 0.45 | 0.75 | \(<0.49, 0.74>\) |
19 | 0.70 | 0.45 | 0.83 | \(<0.58, 0.75>\) | \(\longleftarrow \) | req: address | \(\longleftarrow \) | 0.65 | 0.45 | 0.75 | \(<0.49, 0.74>\) |
20 | 0.70 | 0.65 | 0.83 | \(<0.58, 0.75>\) | \(\longrightarrow \) | dis: address | \(\longrightarrow \) | 0.85 | 0.45 | 0.81 | \(<0.69, 0.88>\) |
21 | 0.70 | 0.65 | 0.83 | \(<0.58, 0.75>\) | Â | auth: confirmed | \(\longleftrightarrow \) | 0.85 | 0.45 | 0.81 | \(<0.69, 0.88>\) |
22 | 0.70 | 0.65 | 0.83 | \(<0.58, 0.75>\) | \(\longleftarrow \) | success | \(\longrightarrow \) | 0.85 | 0.45 | 0.81 | \(<0.69, 0.88>\) |
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kolar, M., Gago, C.F., Lopez, J. (2020). A Model Specification Implementation for Trust Negotiation. In: Kutyłowski, M., Zhang, J., Chen, C. (eds) Network and System Security. NSS 2020. Lecture Notes in Computer Science(), vol 12570. Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-65745-1_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65744-4
Online ISBN: 978-3-030-65745-1
eBook Packages: Computer ScienceComputer Science (R0)