Abstract
This paper raises two problems of trusted services in distributed organizations. First, on a global scale trust becomes a hard issue to solve for many multinationals since there is no such thing as a global PKI, although many efforts try to overcome this gap. We propose an alternative non-institutionalized trust model to overcome this global trust dilemma. Second, trust prohibits real-time concurrent replication of the trusted service on redundants to increase dependability. We argue why the fuzzy concept trust does not permit replication techniques and propose an indirect approach to trust by indicators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gambetta, D. (ed.): Trust: Making and breaking cooperative relations. Basil Blackwell, Oxford (1988)
Morris, J.H., Moberg, D.J.: Work organizations as contexts for trust and betrayal. In: Sarbin, R.T., Carney, R.M., Eoyang, C. (eds.) Citizen espionage: Studies in trust and betrayal, pp. 163–187. US. Praeger Publishers/Greenwood Publishing Group (1994)
Kramer, R.M.: Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions. Annual Review of Psychology 50, 569–598 (1999)
Dirks, K.T., Ferrin, D.L.: The role of Trust in Organizational Settings. Organization Science 12(4), 450–467 (2001)
Shaw, R.B.: Trust in the balance: building successful organizations on results, integrity, and concern. San Francisco, Jossey-Bass (1997)
Rousseau, M.T., Stikin, S.B., Burt, S.B., Camerer, C.: Not so different after all: a crossdiscipline view of trust. Academy of Management Review 23, 393–404 (1998)
Zand, D.E.: Trust and managerial problem solving. Administrative Science Quarterly 17, 229–239 (1972)
Cummings, L.L., Bromiley, P.: The Organizational Trust Inventory (OTI): Development and validation, Trust in organizations. Frontiers of theory and research (1996)
Smith, J.B., Barclay, W.B.: The effects of organizational differences and trust on the effectiveness of selling partner relationships. Journal of Marketing 61, 3–21 (1997)
Costa, A.C., Roe, R.A., Taillieu, T.: Trust within teams: the relation with performance effectiveness. European Journal of Work and Organisational Psychology 10(3), 225–244 (2001)
Costa, A.C.: Work team trust and effectiveness. Personnel Review 32(5), 605–622 (2003)
Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces 63, 967–985 (1985)
Giffin, K., Patton, B.R.: Personal Trust in Human Interaction. Basic Readings in Interpersonal Communication, Harper & Row, New York (1971)
Sheppard, B.H., Sherman, D.M.: The grammars of trust: A model and general implications. Academy of Management Review 23, 422–437 (1998)
Adams, C., Lloyd, S., Understanding, P.K.I.: Concepts, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley, Reading (2002)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure- Certificate and CRL Profile. IETF RFC 2459 (January 1999)
Kent, S.T.: RFC-1422 Privacy Enhancement for Internet Electronic Mail: PartII: Certificate-Based Key Management. Network Working Group (February 1993)
Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An Authentication Service for Open Network Systems. In: Usenix Conference Proc., Dallas, pp. 191–202 (1988)
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution. IEEE/ACM Transactions on Networking 3(1), 31–41 (1995)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming, pp. 185–210. Springer, Heidelberg (1999)
Zimmermann, P.: PGP User’s Guide. MIT Press, Cambridge (1994)
Chen, R.: Poblano- A Distributed Trust Model for Peer-to-Peer Networks. Sun (2002)
Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: NDSS Symposium (2001)
A&N Associates, Phase II Bridge Certification Authority Interoperability Demonstration Final Report. National Security Agency (2001)
Trevor, F.: Certificate Trust List. Microsoft (1999) (unpublished)
Lee, S.-L., Lee, J.I., Lee, H.-S.: Global PKI Interoperability; Korean Endeavour. In: Proc. of the first International Workshop for Asian PKI, Korea (2001)
Barbour, A.E., Wojcik, A.S.: A General Constructive Approach to Fault-Tolerant Design Using Redundancy. IEEE Transactions on Computers 38(1), 15–29 (1989)
Hiltunen, M.A., Schlichting, R.D., Ugarte, C.A.: Building Survivable Services Using Redundancy and Adaptation. IEEE Transactions on Computers 52(2), 181–194 (2003)
Dutertre, B., Crettaz, V., Stavridou, V.: Intrusion-Tolerant Enclaves. In: IEEE Symposium on Security and Privacy, California, pp. 216–226 (2002)
Daskapan, S., Vree, W.G.: Self-organizing trust principle for survivable systems. In: Proc. of the IASTED/ACI, Tokyo, pp. 7–12 (2002)
Daskapan, S., Verbraeck, A., Vree, W.G.: The merge of computing paradigms. In: 5th International Conf. on computer and information technology, Dhaka, pp. 553–558 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daskapan, S., Costa, A.C., Vree, W.G., Eldin, A.A. (2004). Virtual Trust in Distributed Systems. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-30079-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22919-3
Online ISBN: 978-3-540-30079-3
eBook Packages: Springer Book Archive