Skip to main content

A Model Specification Implementation for Trust Negotiation

  • Conference paper
  • First Online:
Network and System Security (NSS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12570))

Included in the following conference series:

  • 1202 Accesses

Abstract

Trust negotiation represents a suitable approach for building trust in online environments, where the interacting entities are anonymous. It covers important criteria on security and privacy. In this work, we propose a method for implementing our model specification that handles trust negotiation. We define the structure of the trust negotiation module that is a standalone unit capable of negotiating on its own. It may be included to any software by its defined interfaces. We realise our method with a ride-sharing scenario and four trust negotiation strategies that we apply in order to validate our design and implementation. We propose a solution that is fully customisable based on different requirements. The proposal provides guidelines for developers in the process of including trust negotiation into their software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gambetta, D.: Can we trust trust? Trust: Making Breaking Coop. Relat. 13, 213–238 (1990)

    Google Scholar 

  2. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)

    Article  Google Scholar 

  3. Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. DARPA Information Survivability Conference and Exposition. In: DISCEX ’00 Proceedings, vol. 1, pp. 88–102 (2000)

    Google Scholar 

  4. Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp. 92–103, IEEE (2002)

    Google Scholar 

  5. Kolar, M., Fernandez-Gago, C., Lopez, J.: Policy languages and their suitability for trust negotiation. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 69–84. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95729-6_5

    Chapter  Google Scholar 

  6. Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 146–155 (2001)

    Google Scholar 

  7. Moyano, F.: Trust engineering framework for software services. Universidad de Málaga, Lenguajes y Ciencias de la Computación. PhD thesis (2015)

    Google Scholar 

  8. Winslett, M., et al.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30–37 (2002)

    Article  Google Scholar 

  9. Bonatti, P., De Coi, J.L., Olmedilla, D., Sauro, L.: A rule-based trust negotiation system. IEEE Trans. Knowl. Data Eng. 22(11), 1507–1520 (2010)

    Article  Google Scholar 

  10. Hess, A., Holt, J., Jacobson, J., Seamons, K.E.: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3), 428–456 (2004)

    Article  Google Scholar 

  11. Guo, S., Jiang, W.: An adaptive automated trust negotiation model and algorithm. In: International Conference on Communications and Intelligence Information Security, Nanning, pp. 130–134. IEEE (2010)

    Google Scholar 

  12. Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 129–143. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_10

    Chapter  MATH  Google Scholar 

  13. Ruparelia, N.B.: Software development lifecycle models. ACM SIGSOFT Softw. Eng. Notes 35(3), 8–13 (2010)

    Article  Google Scholar 

  14. Driver, M., Gaehtgens, F., O’Neill, M.: Managing digital trust in the software development life cycle. ID G00326944, Gartner (2017)

    Google Scholar 

  15. Kolar, M., Fernandez-Gago, C., Lopez, J.: A model specification for the design of trust negotiations. Comput. Secur. 84, 288–300 (2019)

    Article  Google Scholar 

  16. Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: TROPOS: an agent-oriented software development methodology. Auton. Agent Multi-Agent Syst. 8(3), 203–236 (2004). https://doi.org/10.1023/B:AGNT.0000018806.20944.ef

    Article  MATH  Google Scholar 

  17. Casey, V., Richardson, I.: Implementation of global software development: a structured approach. Softw. Process: Improv. Pract. 14(5), 247–262 (2009)

    Article  Google Scholar 

  18. Ilieva, S., Ivanov, P., Stefanova, E.: Analyses of an agile methodology implementation. In: Proceedings of the 30th Euromicro Conference, pp. 326–333. IEEE (2004)

    Google Scholar 

  19. Theodorakopoulos, G., Baras, J.S.: Trust evaluation in Ad-Hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe ’04), New York, USA, pp. 1–10. ACM (2004)

    Google Scholar 

Download references

Acknowledgements

This research has been partially supported by the Spanish Ministry of Science and Innovation through the project SecurEdge (PID2019-110565RB-I00) and by the European Commission through the project EU H2020-SU-ICT-03–2018 Project No. 830929 CyberSec4Europe (cybersec4europe.eu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Kolar .

Editor information

Editors and Affiliations

Appendices

Appendix A Optimistic Strategy

 

Driver

Trust Negotiation

Passenger

 

Required trust: 6

 

Required trust: 12

Exposure limit: 10

Exposure limit: 8

Step

Trust

Exposure

   

Trust

Exposure

1

0

0

\(\longleftarrow \)

request: phone number

\(\longleftarrow \)

0

0

2

0

1

\(\longrightarrow \)

disclosure: phone number

\(\longrightarrow \)

3

0

3

0

1

\(\longrightarrow \)

request: phone number

\(\longrightarrow \)

3

0

4

2

1

\(\longleftarrow \)

disclosure: phone number

\(\longleftarrow \)

3

3

5

2

1

\(\longleftarrow \)

request: price list

\(\longleftarrow \)

3

3

6

2

2

\(\longrightarrow \)

disclosure: price list

\(\longrightarrow \)

5

3

7

2

2

\(\longrightarrow \)

request: address

\(\longrightarrow \)

5

3

8

5

2

\(\longleftarrow \)

disclosure: address

\(\longleftarrow \)

5

6

9

5

2

\(\longleftarrow \)

request: driving history

\(\longleftarrow \)

5

6

10

5

6

\(\longrightarrow \)

disclosure: driving history

\(\longrightarrow \)

8

6

11

5

6

\(\longrightarrow \)

request: luggage info

\(\longrightarrow \)

8

6

12

6

6

\(\longleftarrow \)

disclosure: luggage info

\(\longleftarrow \)

8

7

13

6

6

\(\longleftarrow \)

request: space info

\(\longleftarrow \)

8

7

14

6

7

\(\longrightarrow \)

disclosure: space info

\(\longrightarrow \)

10

7

15

6

7

\(\longleftarrow \)

request: address

\(\longleftarrow \)

10

7

16

6

7

\(\longrightarrow \)

disclosure denied

\(\longrightarrow \)

10

7

17

6

7

\(\longleftarrow \)

request: latest ride

\(\longleftarrow \)

10

7

18

6

8

\(\longrightarrow \)

disclosure: latest ride

\(\longrightarrow \)

12

7

19

6

8

\(\longleftarrow \)

successful termination

\(\longrightarrow \)

12

7

Appendix B Pessimistic Strategy

 

Driver

Trust Negotiation

Passenger

 

Required trust: 6

 

Required trust: 12

Exposure limit: 10

Exposure limit: 9

Step

Trust

Exp

Unb.Level

Unb.Limit

   

Trust

Exp

Unb.Level

Unb.Limit

1

0

0

0

2

\(\longleftarrow \)

request: phone number

\(\longleftarrow \)

0

0

0

0

2

0

1

1

2

\(\longrightarrow \)

disclosure: phone number

\(\longrightarrow \)

2

0

-2

0

3

0

1

1

2

\(\longrightarrow \)

request: phone number

\(\longrightarrow \)

2

0

-2

0

4

0

1

1

2

\(\longleftarrow \)

disclosure denied

\(\longleftarrow \)

2

0

-2

0

5

0

1

1

2

\(\longrightarrow \)

request: e-mail

\(\longrightarrow \)

2

0

-2

0

6

1

1

0

2

\(\longleftarrow \)

disclosure: e-mail

\(\longleftarrow \)

2

2

0

0

7

1

1

0

2

\(\longleftarrow \)

request: price list

\(\longleftarrow \)

2

2

0

0

8

1

2

1

2

\(\longrightarrow \)

disclosure: price list

\(\longrightarrow \)

4

2

-2

2

9

1

2

1

2

\(\longrightarrow \)

request: address

\(\longrightarrow \)

4

2

-2

2

10

1

2

1

2

\(\longleftarrow \)

disclosure denied

\(\longleftarrow \)

4

2

-2

2

11

1

2

1

2

\(\longrightarrow \)

request: phone number

\(\longrightarrow \)

4

2

-2

2

12

3

2

-1

2

\(\longleftarrow \)

disclosure: phone number

\(\longleftarrow \)

4

5

1

2

13

3

2

-1

2

\(\longleftarrow \)

request: driving history

\(\longleftarrow \)

4

5

1

2

14

3

2

-1

2

\(\longrightarrow \)

disclosure denied

\(\longrightarrow \)

4

5

1

2

15

3

2

-1

2

\(\longleftarrow \)

request: space info

\(\longleftarrow \)

4

5

1

2

16

3

3

0

2

\(\longrightarrow \)

disclosure: space info

\(\longrightarrow \)

6

5

-1

2

17

3

3

0

2

\(\longrightarrow \)

request: address

\(\longrightarrow \)

6

5

-1

2

18

3

3

0

2

\(\longleftarrow \)

disclosure denied

\(\longleftarrow \)

6

5

-1

2

19

3

3

0

2

\(\longrightarrow \)

request: luggage info

\(\longrightarrow \)

6

5

-1

2

20

4

3

-1

4

\(\longleftarrow \)

disclosure: luggage info

\(\longleftarrow \)

6

6

0

2

21

4

3

-1

4

\(\longleftarrow \)

request: latest ride

\(\longleftarrow \)

6

6

0

2

22

4

4

0

4

\(\longrightarrow \)

disclosure: latest ride

\(\longrightarrow \)

8

6

-2

4

23

4

4

0

4

\(\longrightarrow \)

request: address

\(\longrightarrow \)

8

6

-2

4

24

7

4

-3

5

\(\longleftarrow \)

disclosure: address

\(\longleftarrow \)

8

9

1

4

25

7

4

-3

5

\(\longleftarrow \)

request: driving history

\(\longleftarrow \)

8

9

1

4

26

7

8

1

5

\(\longrightarrow \)

disclosure: driving history

\(\longrightarrow \)

11

9

-2

4

27

7

8

1

5

\(\longleftarrow \)

request: address

\(\longleftarrow \)

11

9

-2

4

28

7

10

3

5

\(\longrightarrow \)

disclosure: address

\(\longrightarrow \)

13

9

-4

4

29

7

10

3

5

\(\longleftarrow \)

successful termination

\(\longrightarrow \)

13

9

-4

4

Appendix C Balanced Strategy

 

Driver

Trust Negotiation

Passenger

 

Required trust: 6

 

Required trust: 12

Exposure limit: 10

Exposure limit: 8

Required conf.: 0.8

Required conf.: 0.6

Step

Trust

Exp

Conf

   

Trust

Exp

Conf.

1

0

0

0

\(\longleftarrow \)

request: phone number

\(\longleftarrow \)

0

0

0

2

0

1

0

\(\longrightarrow \)

disclosure: phone number

\(\longrightarrow \)

3

0

0.6

3

0

1

0

\(\longrightarrow \)

request: phone number

\(\longrightarrow \)

3

0

0.6

4

2

1

0.7

\(\longleftarrow \)

disclosure: phone number

\(\longleftarrow \)

3

3

0.6

5

2

1

0.7

\(\longleftarrow \)

request: price list

\(\longleftarrow \)

3

3

0.6

6

2

2

0.7

\(\longrightarrow \)

disclosure: price list

\(\longrightarrow \)

5

3

0.6

7

2

2

0.7

\(\longrightarrow \)

request: address

\(\longrightarrow \)

5

3

0.6

8

5

2

0.88

\(\longleftarrow \)

disclosure: address

\(\longleftarrow \)

5

6

0.6

9

5

2

0.88

\(\longleftrightarrow \)

authority: confirmed

 

5

6

0.6

10

5

2

0.88

\(\longleftarrow \)

request: driving history

\(\longleftarrow \)

5

6

0.6

11

5

6

0.88

\(\longrightarrow \)

disclosure: driving history

\(\longrightarrow \)

8

6

0.75

12

5

6

0.88

 

authority: confirmed

\(\longleftrightarrow \)

8

6

0.75

13

5

6

0.88

\(\longrightarrow \)

request: luggage info

\(\longrightarrow \)

8

6

0.75

14

6

6

0.85

\(\longleftarrow \)

disclosure: luggage info

\(\longleftarrow \)

8

7

0.75

15

6

6

0.85

\(\longleftarrow \)

request: space info

\(\longleftarrow \)

8

7

0.75

16

6

7

0.85

\(\longrightarrow \)

disclosure: space info

\(\longrightarrow \)

10

7

0.72

17

6

7

0.85

\(\longleftarrow \)

request: address

\(\longleftarrow \)

10

7

0.72

18

6

9

0.85

\(\longrightarrow \)

disclosure: address

\(\longrightarrow \)

12

7

0.77

19

6

9

0.85

 

authority: confirmed

\(\longleftrightarrow \)

12

7

0.77

20

6

9

0.85

\(\longleftarrow \)

successful termination

\(\longrightarrow \)

12

7

0.77

Appendix D Improved Balanced Strategy

 

Driver

Trust Negotiation

Passenger

 

Required trust: 0.6

 

Required trust: 0.75

Exposure limit: 0.8

Exposure limit: 0.55

St

Trust

Exp

Conf

TI

   

Trust

Exp

Conf

TI

1

0

0

0

\(<0, 1>\)

\(\longleftarrow \)

req: phone number

\(\longleftarrow \)

0

0

0

\(<0, 1>\)

2

0

0.05

0

\(<0, 1>\)

\(\longrightarrow \)

dis: phone number

\(\longrightarrow \)

0.15

0

0.6

\(<0.09, 0.49>\)

3

0

0.05

0

\(<0, 1>\)

\(\longrightarrow \)

req: phone number

\(\longrightarrow \)

0.15

0

0.6

\(<0.09, 0.49>\)

4

0.20

0.05

0.7

\(<0.14, 0.44>\)

\(\longleftarrow \)

dis: phone number

\(\longleftarrow \)

0.15

0.15

0.6

\(<0.09, 0.49>\)

5

0.20

0.05

0.7

\(<0.14, 0.44>\)

\(\longleftarrow \)

req: price list

\(\longleftarrow \)

0.15

0.15

0.6

\(<0.09, 0.49>\)

6

0.20

0.15

0.7

\(<0.14, 0.44>\)

\(\longrightarrow \)

dis: price list

\(\longrightarrow \)

0.30

0.15

0.6

\(<0.18, 0.58>\)

7

0.20

0.15

0.7

\(<0.14, 0.44>\)

\(\longrightarrow \)

req: address

\(\longrightarrow \)

0.30

0.15

0.6

\(<0.18, 0.58>\)

8

0.50

0.15

0.88

\(<0.44, 0.56>\)

\(\longleftarrow \)

dis: address

\(\longleftarrow \)

0.30

0.30

0.6

\(<0.18, 0.58>\)

9

0.50

0.15

0.88

\(<0.44, 0.56>\)

\(\longleftrightarrow \)

auth: confirmed

 

0.30

0.30

0.6

\(<0.18, 0.58>\)

10

0.50

0.15

0.88

\(<0.44, 0.56>\)

\(\longleftarrow \)

req: driving history

\(\longleftarrow \)

0.30

0.30

0.6

\(<0.18, 0.58>\)

11

0.50

0.35

0.88

\(<0.44, 0.56>\)

\(\longrightarrow \)

dis: driving history

\(\longrightarrow \)

0.55

0.30

0.78

\(<0.43, 0.65>\)

12

0.50

0.35

0.88

\(<0.44, 0.56>\)

 

auth: confirmed

\(\longleftrightarrow \)

0.55

0.30

0.78

\(<0.43, 0.65>\)

13

0.50

0.35

0.88

\(<0.44, 0.56>\)

\(\longrightarrow \)

req: luggage info

\(\longrightarrow \)

0.55

0.30

0.78

\(<0.43, 0.65>\)

14

0.60

0.35

0.85

\(<0.51, 0.66>\)

\(\longleftarrow \)

dis: luggage info

\(\longleftarrow \)

0.55

0.35

0.78

\(<0.43, 0.65>\)

15

0.60

0.35

0.85

\(<0.51, 0.66>\)

\(\longleftarrow \)

req: space info

\(\longleftarrow \)

0.55

0.35

0.78

\(<0.43, 0.65>\)

16

0.60

0.45

0.85

\(<0.51, 0.66>\)

\(\longrightarrow \)

dis: space info

\(\longrightarrow \)

0.65

0.35

0.75

\(<0.49, 0.74>\)

17

0.60

0.45

0.85

\(<0.51, 0.66>\)

\(\longrightarrow \)

req: e-mail

\(\longrightarrow \)

0.65

0.35

0.75

\(<0.49, 0.74>\)

18

0.70

0.45

0.83

\(<0.58, 0.75>\)

\(\longleftarrow \)

dis: e-mail

\(\longleftarrow \)

0.65

0.45

0.75

\(<0.49, 0.74>\)

19

0.70

0.45

0.83

\(<0.58, 0.75>\)

\(\longleftarrow \)

req: address

\(\longleftarrow \)

0.65

0.45

0.75

\(<0.49, 0.74>\)

20

0.70

0.65

0.83

\(<0.58, 0.75>\)

\(\longrightarrow \)

dis: address

\(\longrightarrow \)

0.85

0.45

0.81

\(<0.69, 0.88>\)

21

0.70

0.65

0.83

\(<0.58, 0.75>\)

 

auth: confirmed

\(\longleftrightarrow \)

0.85

0.45

0.81

\(<0.69, 0.88>\)

22

0.70

0.65

0.83

\(<0.58, 0.75>\)

\(\longleftarrow \)

success

\(\longrightarrow \)

0.85

0.45

0.81

\(<0.69, 0.88>\)

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kolar, M., Gago, C.F., Lopez, J. (2020). A Model Specification Implementation for Trust Negotiation. In: Kutyłowski, M., Zhang, J., Chen, C. (eds) Network and System Security. NSS 2020. Lecture Notes in Computer Science(), vol 12570. Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65745-1_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65744-4

  • Online ISBN: 978-3-030-65745-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics