Skip to main content

Towards Designing Application Specific Trust Treated Model

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3446 Accesses

Abstract

In this paper, we present a process based on aspect oriented methodology to treat a trust model against trust related threats. The trust services are based on a service oriented architecture. We believe that due to the crosscutting natures of concerns in trust dependent applications, concepts of aspect oriented methodology can be applied to develop specifications for trust models. The trust modeling process comprises of the trust service primary model to specify trust services and trust treated aspect model to specify threats as patterns. The primary and aspect models can be composed with application specific scenarios to develop a trust treated model. We have selected the reputation service as an example of a trust service to illustrate the trust modeling process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A.: A Framework for Decentralised Trust Reasoning. Ph.D. thesis, University College London (2005)

    Google Scholar 

  2. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii Int’l Conf. System Sciences (January 2000)

    Google Scholar 

  3. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system (November 2001)

    Google Scholar 

  4. Aldawud, O., Elrad, T., Bader, A.: A UML profile for aspect oriented modeling. In: Proceedings of the OOPSLA Workshop on AOP (2001)

    Google Scholar 

  5. Azzedin, F., Eltoweissy, M., Khwaja, S.: Overview of service oriented architecture for resource management in p2p systems. In: Antonopoulos, N., Exarchakos, G., Li, M., Liotta, A. (eds.) The Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications (2009)

    Google Scholar 

  6. Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. Journal of Grid Computing 4(3), 247–263 (2006)

    Article  MATH  Google Scholar 

  7. Clark, D.D., Wroclawski, J., Braden, R.: Tussle in cyberspace: Defining tomorrow’s internet. In: Proceedings of the 2002 Conference on Applications, Technologies and Protocols for Computer Communications, pp. 347–356 (August 2002)

    Google Scholar 

  8. Dorina, C.P., Hui, S., Antonino, S.: Perfromance analysis of aspect-oriented UML models. Software System Model 6, 453–471 (2007)

    Article  Google Scholar 

  9. Elrad, T., Aldawud, O., Bader, A.: Aspect-oriented modeling: bridging the gap between implementation and design. In: Batory, D., Consel, C., Taha, W. (eds.) GPCE 2002. LNCS, vol. 2487, pp. 189–201. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Gao, J., Steenkiste, P.: Design and evaluation of a distributed scalable content discovery system. IEEE Journal of Selected Areas in Communications 22(1) (January 2004)

    Google Scholar 

  11. Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An aspect oriented methodology for designing secure applications. Information and Software Technology 51, 846–864 (2009)

    Article  Google Scholar 

  12. Gray, J., Bapty, T., Neema, S., Schmidt, D.C., Gokhale, A., Natarajan, B.: An approach for supporting aspect-oriented domain modeling. In: Pfenning, F., Smaragdakis, Y. (eds.) GPCE 2003. LNCS, vol. 2830, pp. 151–168. Springer, Heidelberg (2003)

    Google Scholar 

  13. Ray, I., Georg, G., Anastasakis, K., Bordbar, B., Toahchoodee, M.: An aspect-oriented methodology for designing secure applications. Information and Software Technology 51, 846–864 (2009)

    Article  Google Scholar 

  14. Pawlack, R., Duchien, L., Florin, G.: A UML notation for aspect-oriented software design. In: Proceedings of the AO Modeling with UML Workshop (2002)

    Google Scholar 

  15. Rashid, A., Moreira, A., Araujo, J.: Modularization and composition of aspect requirements. In: Proceedings of 2nd International Conference on Aspect-Oriented Software Development (2003)

    Google Scholar 

  16. Ries, S., Kangasharju, J., Mhlhuser, M.: Modeling trust for users and agents in ubiquitous computing. In: KiVS 2007, pp. 51–62 (2007)

    Google Scholar 

  17. Rodriguez, P., Tan, S., Gkantsidis, C.: On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review 36(1), 75–78 (2006)

    Article  Google Scholar 

  18. Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Addison-Wesley, Reading (2005)

    Google Scholar 

  19. Sen, S., Sajja, N.: Robustness of reputation-based trust: Boolean case. In: 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), pp. 288–293 (July 2002)

    Google Scholar 

  20. Straw, G., Georg, G., Song, E., Ghosh, S., France, R., Bieman, J.M.: Modeling composition directives. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) UML 2004. LNCS, vol. 3273, pp. 84–97. Springer, Heidelberg (2004)

    Google Scholar 

  21. Tanter, E., Gybels, K., Denker, M., Bergel, A.: Context-aware aspects. In: Löwe, W., Südholt, M. (eds.) SC 2006. LNCS, vol. 4089, pp. 227–242. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  22. Trillo, C.P., Rocha, V.: Architectural patterns to secure applications with an aspect oriented approach. In: Proceedings of the 5th Latin American Conference on Pattern Language of Programming, pp. 89–105 (2005)

    Google Scholar 

  23. Wang, H., Zhu, Y., Hu, Y.: To unify structured and unstructured P2P systems. In: 19th IEEE International Parallel and Distributed Processing Symposium (April 2005)

    Google Scholar 

  24. Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: Proceedings of IEEE/WIC International Conference on Web Intelligence, WI 2003, October 13-17, pp. 372–378 (2003)

    Google Scholar 

  25. Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowledge & Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  26. Yan, Z., Niemi, V.: A trust model for ubiquitous systems based on vectors of trust values. In: The Seventh IEEE International Symposium on Meltimedia, ISM 2005 (December 2005)

    Google Scholar 

  27. Yan, Z., Niemi, V.: Towards user driven trust modeling and management. In: iTrust/PST 2008 (June 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Azzedin, F., Mahmood, S. (2010). Towards Designing Application Specific Trust Treated Model. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics