Skip to main content

A Comprehensive Comparison of Trust Management Systems for Federation

  • Conference paper
  • 692 Accesses

Abstract

Federation becomes pervasive in information sharing and collabora-tions over distributed systems, ubiquitous systems, and the Internet. Trust management plays a critical role to smooth collaborations and information sharing across different trust domains. The federation of trust management is a new direction for these networked systems. In this paper, the requirements and a set of evaluation metrics for federated trust management systems are briefly examined, and then a comprehensive comparison of extant trust management systems is made against these metrics. The purpose of this paper is not to provide an ultimate comparison covering all necessary features; instead, its purpose is to initiate a discussion and to offer a context in which to evaluate current and future solutions, in order to encourage the development of proper models and systems for federated trust management.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Wu, Z., Weaver, A.C.: Requirements of federated trust management for service-oriented architectures. International Journal of Information Security 6(5), 287–296 (2007)

    Article  Google Scholar 

  3. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials (Fourth Quarter, 2000), http://www.comsoc.org/pubs/surveys/

  4. IBM: IBM Trust Establishment Policy Language, http://www.hrl.il.ibm.com/TrustEstablishment/PolicyLanguage.asp

  5. IBM: Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers. In: Proc. of IEEE Symposium on Security and Privacy (2000), http://www.hrl.il.ibm.com/TrustEstablishment/paper.asp

  6. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  7. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  8. Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. World Wide Web Journal 2, 127–139 (1997)

    Google Scholar 

  9. Liberty Alliance: Liberty Alliance Complete Specifications ZIP Package (2008), http://www.projectliberty.org/resource_center/specifications/liberty_alliance_complete_specifications_zip_package_22_june_2008

  10. OASIS Security Services TC: Security Assertion Markup Language (SAML) V2.0 Technical Overview (2008), http://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf

  11. Ryutov, T., et al.: Adaptive Trust Negotiation and Access Control. In: Proc. of 11th ACM Symposium on Access Control Models and Technologies, pp. 139–146 (2005)

    Google Scholar 

  12. Ryutov, T., Neuman, C.: The Specification and Enforcement of Advanced security Policies. In: Proc. of the 2002 Conference on Policies for Distributed Systems and Networks (2002)

    Google Scholar 

  13. Winslett, M., Yu, T., Seamons, K.E., et al.: The TrustBuilder Architecture for Trust Negotiation. IEEE Internet Computing 6(6), 30–37 (2002)

    Article  Google Scholar 

  14. Klos, T., Poutre, H.L.: Using Reputation-Based Trust for Assessing Agent Reliability. In: Proc. of the AAMAS-2004 Workshop on Trust in Agent Societies, pp. 75–82 (2004)

    Google Scholar 

  15. Fullam, K., Barber, K.S.: A Temporal Policy for Trusting Information. In: Proc. of the AAMAS-2004 Workshop on Trust in Agent Societies, pp. 47–57 (2004)

    Google Scholar 

  16. Ghanea-Hercock, R.: The Cost of Trust. In: Proc. of the AAMAS-2004 Workshop on Trust in Agent Societies, pp. 58–64 (2004)

    Google Scholar 

  17. Klos, T.B., Poutré, H.L.: Decentralized reputation-based trust for assessing agent reliability under aggregate feedback. In: Proc. of the 7th Workshop on Trust in Agent Societies, pp. 75–82 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Wu, Z. (2009). A Comprehensive Comparison of Trust Management Systems for Federation. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics