Abstract
In this paper, we present a process based on aspect oriented methodology to treat a trust model against trust related threats. The trust services are based on a service oriented architecture. We believe that due to the crosscutting natures of concerns in trust dependent applications, concepts of aspect oriented methodology can be applied to develop specifications for trust models. The trust modeling process comprises of the trust service primary model to specify trust services and trust treated aspect model to specify threats as patterns. The primary and aspect models can be composed with application specific scenarios to develop a trust treated model. We have selected the reputation service as an example of a trust service to illustrate the trust modeling process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdul-Rahman, A.: A Framework for Decentralised Trust Reasoning. Ph.D. thesis, University College London (2005)
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii Int’l Conf. System Sciences (January 2000)
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system (November 2001)
Aldawud, O., Elrad, T., Bader, A.: A UML profile for aspect oriented modeling. In: Proceedings of the OOPSLA Workshop on AOP (2001)
Azzedin, F., Eltoweissy, M., Khwaja, S.: Overview of service oriented architecture for resource management in p2p systems. In: Antonopoulos, N., Exarchakos, G., Li, M., Liotta, A. (eds.) The Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications (2009)
Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. Journal of Grid Computing 4(3), 247–263 (2006)
Clark, D.D., Wroclawski, J., Braden, R.: Tussle in cyberspace: Defining tomorrow’s internet. In: Proceedings of the 2002 Conference on Applications, Technologies and Protocols for Computer Communications, pp. 347–356 (August 2002)
Dorina, C.P., Hui, S., Antonino, S.: Perfromance analysis of aspect-oriented UML models. Software System Model 6, 453–471 (2007)
Elrad, T., Aldawud, O., Bader, A.: Aspect-oriented modeling: bridging the gap between implementation and design. In: Batory, D., Consel, C., Taha, W. (eds.) GPCE 2002. LNCS, vol. 2487, pp. 189–201. Springer, Heidelberg (2002)
Gao, J., Steenkiste, P.: Design and evaluation of a distributed scalable content discovery system. IEEE Journal of Selected Areas in Communications 22(1) (January 2004)
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An aspect oriented methodology for designing secure applications. Information and Software Technology 51, 846–864 (2009)
Gray, J., Bapty, T., Neema, S., Schmidt, D.C., Gokhale, A., Natarajan, B.: An approach for supporting aspect-oriented domain modeling. In: Pfenning, F., Smaragdakis, Y. (eds.) GPCE 2003. LNCS, vol. 2830, pp. 151–168. Springer, Heidelberg (2003)
Ray, I., Georg, G., Anastasakis, K., Bordbar, B., Toahchoodee, M.: An aspect-oriented methodology for designing secure applications. Information and Software Technology 51, 846–864 (2009)
Pawlack, R., Duchien, L., Florin, G.: A UML notation for aspect-oriented software design. In: Proceedings of the AO Modeling with UML Workshop (2002)
Rashid, A., Moreira, A., Araujo, J.: Modularization and composition of aspect requirements. In: Proceedings of 2nd International Conference on Aspect-Oriented Software Development (2003)
Ries, S., Kangasharju, J., Mhlhuser, M.: Modeling trust for users and agents in ubiquitous computing. In: KiVS 2007, pp. 51–62 (2007)
Rodriguez, P., Tan, S., Gkantsidis, C.: On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review 36(1), 75–78 (2006)
Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Addison-Wesley, Reading (2005)
Sen, S., Sajja, N.: Robustness of reputation-based trust: Boolean case. In: 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), pp. 288–293 (July 2002)
Straw, G., Georg, G., Song, E., Ghosh, S., France, R., Bieman, J.M.: Modeling composition directives. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) UML 2004. LNCS, vol. 3273, pp. 84–97. Springer, Heidelberg (2004)
Tanter, E., Gybels, K., Denker, M., Bergel, A.: Context-aware aspects. In: Löwe, W., Südholt, M. (eds.) SC 2006. LNCS, vol. 4089, pp. 227–242. Springer, Heidelberg (2006)
Trillo, C.P., Rocha, V.: Architectural patterns to secure applications with an aspect oriented approach. In: Proceedings of the 5th Latin American Conference on Pattern Language of Programming, pp. 89–105 (2005)
Wang, H., Zhu, Y., Hu, Y.: To unify structured and unstructured P2P systems. In: 19th IEEE International Parallel and Distributed Processing Symposium (April 2005)
Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: Proceedings of IEEE/WIC International Conference on Web Intelligence, WI 2003, October 13-17, pp. 372–378 (2003)
Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowledge & Data Engineering 16(7), 843–857 (2004)
Yan, Z., Niemi, V.: A trust model for ubiquitous systems based on vectors of trust values. In: The Seventh IEEE International Symposium on Meltimedia, ISM 2005 (December 2005)
Yan, Z., Niemi, V.: Towards user driven trust modeling and management. In: iTrust/PST 2008 (June 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Azzedin, F., Mahmood, S. (2010). Towards Designing Application Specific Trust Treated Model. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)