Skip to main content

Virtual Trust in Distributed Systems

  • Conference paper
Book cover Trust and Privacy in Digital Business (TrustBus 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3184))

Abstract

This paper raises two problems of trusted services in distributed organizations. First, on a global scale trust becomes a hard issue to solve for many multinationals since there is no such thing as a global PKI, although many efforts try to overcome this gap. We propose an alternative non-institutionalized trust model to overcome this global trust dilemma. Second, trust prohibits real-time concurrent replication of the trusted service on redundants to increase dependability. We argue why the fuzzy concept trust does not permit replication techniques and propose an indirect approach to trust by indicators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gambetta, D. (ed.): Trust: Making and breaking cooperative relations. Basil Blackwell, Oxford (1988)

    Google Scholar 

  2. Morris, J.H., Moberg, D.J.: Work organizations as contexts for trust and betrayal. In: Sarbin, R.T., Carney, R.M., Eoyang, C. (eds.) Citizen espionage: Studies in trust and betrayal, pp. 163–187. US. Praeger Publishers/Greenwood Publishing Group (1994)

    Google Scholar 

  3. Kramer, R.M.: Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions. Annual Review of Psychology 50, 569–598 (1999)

    Article  Google Scholar 

  4. Dirks, K.T., Ferrin, D.L.: The role of Trust in Organizational Settings. Organization Science 12(4), 450–467 (2001)

    Article  Google Scholar 

  5. Shaw, R.B.: Trust in the balance: building successful organizations on results, integrity, and concern. San Francisco, Jossey-Bass (1997)

    Google Scholar 

  6. Rousseau, M.T., Stikin, S.B., Burt, S.B., Camerer, C.: Not so different after all: a crossdiscipline view of trust. Academy of Management Review 23, 393–404 (1998)

    Google Scholar 

  7. Zand, D.E.: Trust and managerial problem solving. Administrative Science Quarterly 17, 229–239 (1972)

    Article  Google Scholar 

  8. Cummings, L.L., Bromiley, P.: The Organizational Trust Inventory (OTI): Development and validation, Trust in organizations. Frontiers of theory and research (1996)

    Google Scholar 

  9. Smith, J.B., Barclay, W.B.: The effects of organizational differences and trust on the effectiveness of selling partner relationships. Journal of Marketing 61, 3–21 (1997)

    Article  Google Scholar 

  10. Costa, A.C., Roe, R.A., Taillieu, T.: Trust within teams: the relation with performance effectiveness. European Journal of Work and Organisational Psychology 10(3), 225–244 (2001)

    Article  Google Scholar 

  11. Costa, A.C.: Work team trust and effectiveness. Personnel Review 32(5), 605–622 (2003)

    Article  Google Scholar 

  12. Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces 63, 967–985 (1985)

    Article  Google Scholar 

  13. Giffin, K., Patton, B.R.: Personal Trust in Human Interaction. Basic Readings in Interpersonal Communication, Harper & Row, New York (1971)

    Google Scholar 

  14. Sheppard, B.H., Sherman, D.M.: The grammars of trust: A model and general implications. Academy of Management Review 23, 422–437 (1998)

    Article  Google Scholar 

  15. Adams, C., Lloyd, S., Understanding, P.K.I.: Concepts, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley, Reading (2002)

    Google Scholar 

  16. Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure- Certificate and CRL Profile. IETF RFC 2459 (January 1999)

    Google Scholar 

  17. Kent, S.T.: RFC-1422 Privacy Enhancement for Internet Electronic Mail: PartII: Certificate-Based Key Management. Network Working Group (February 1993)

    Google Scholar 

  18. Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An Authentication Service for Open Network Systems. In: Usenix Conference Proc., Dallas, pp. 191–202 (1988)

    Google Scholar 

  19. Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution. IEEE/ACM Transactions on Networking 3(1), 31–41 (1995)

    Article  Google Scholar 

  20. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming, pp. 185–210. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  21. Zimmermann, P.: PGP User’s Guide. MIT Press, Cambridge (1994)

    Google Scholar 

  22. Chen, R.: Poblano- A Distributed Trust Model for Peer-to-Peer Networks. Sun (2002)

    Google Scholar 

  23. Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: NDSS Symposium (2001)

    Google Scholar 

  24. A&N Associates, Phase II Bridge Certification Authority Interoperability Demonstration Final Report. National Security Agency (2001)

    Google Scholar 

  25. Trevor, F.: Certificate Trust List. Microsoft (1999) (unpublished)

    Google Scholar 

  26. Lee, S.-L., Lee, J.I., Lee, H.-S.: Global PKI Interoperability; Korean Endeavour. In: Proc. of the first International Workshop for Asian PKI, Korea (2001)

    Google Scholar 

  27. Barbour, A.E., Wojcik, A.S.: A General Constructive Approach to Fault-Tolerant Design Using Redundancy. IEEE Transactions on Computers 38(1), 15–29 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  28. Hiltunen, M.A., Schlichting, R.D., Ugarte, C.A.: Building Survivable Services Using Redundancy and Adaptation. IEEE Transactions on Computers 52(2), 181–194 (2003)

    Article  Google Scholar 

  29. Dutertre, B., Crettaz, V., Stavridou, V.: Intrusion-Tolerant Enclaves. In: IEEE Symposium on Security and Privacy, California, pp. 216–226 (2002)

    Google Scholar 

  30. Daskapan, S., Vree, W.G.: Self-organizing trust principle for survivable systems. In: Proc. of the IASTED/ACI, Tokyo, pp. 7–12 (2002)

    Google Scholar 

  31. Daskapan, S., Verbraeck, A., Vree, W.G.: The merge of computing paradigms. In: 5th International Conf. on computer and information technology, Dhaka, pp. 553–558 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Daskapan, S., Costa, A.C., Vree, W.G., Eldin, A.A. (2004). Virtual Trust in Distributed Systems. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30079-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22919-3

  • Online ISBN: 978-3-540-30079-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics