Abstract
In recent years, with the rapid proliferation of new computing technologies, a variety of new computing environments have been introduced, such as decentralisation and mobility. The traditional security mechanisms are seen to be inadequate for these new environments. Trust is applied as a “soft security” to cope with new security concerns. Much research on trust systems has been carried out, it is important to identify the reliability of computational trust in different computing scenarios in order to make an enhancement. The reliability of trust systems for securing social interaction is demonstrated by showing the performance of the three trust-based systems under various scenarios in a pervasive computing environment. The focus of this paper is on enhancing trust-based systems and proposing a novel monitor model which supplements existing trust models.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, p. 164. IEEE Computer Society, Washington (1996)
Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, vol, vol. 6, p. 6007. IEEE Computer Society, Washington (2000)
Jia, L., Nixon, P.: Trust-based SPAM Prevention for Pervasive Advertising. In: Proceedings of the Seventh International Conference on Pervasive Computing Pervasive 2009, Workshop on Pervasive Advertising (2009)
Jia, L., Collins, M., Nixon, P.: Evaluating Trust-Based Access Control for Social Interaction. In: Proceedings of the Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 277–282. IEEE, Sliema (2009)
Almenarez, F., Marin, A., Campo, C., Garcia, R.C.: TrustAC: Trust-based Access Control for Pervasive Devices. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 225–238. Springer, Heidelberg (2005)
Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J.M., Yong, C.: Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications. Trinity College Dublin Technical Report, vol. 66. Dublin, Ireland (2002)
Plattner, B., Nievergelt, J.: Monitoring Program Execution: A Survey. Computer 14(1), 76–93 (1981)
Delgado, N., Gates, A.Q., Roach, S.: A Taxonomy and Catalog of Runtime Software-fault Monitoring Tools. IEEE Trans. Softw. Eng. 30(12), 859–872 (2004)
Gu, W., Eisenhauer, G., Kraemer, E., Schwan, K., Stasko, J., Vetter, J., Mallavarupu, N.: Falcon: On-line Monitoring and Steering of Large-Scale Parallel Programs. In: Proceedings of the Fifth Symposium on the Frontiers of Massively Parallel Computation, pp. 422–429. IEEE Computer Society Press, Washington (1995)
Bruegge, B., Gottschalk, T., Luo, B.: A Framework for Dynamic Program Analyzers. In: Proceedings of the Eighth Annual Conference on Object-oriented Programming Systems, Languages, and Applications, vol. 28, p. 82. ACM, Washington (1993)
Zanikolas, S., Sakellariou, R.: A Taxonomy of Grid Monitoring Systems. Future General Computer System 21(1), 163–188 (2005)
English, C., Terzis, S., Nixon, P.: Towards Self-protecting Ubiquitous Systems: Monitoring Trust-based Interactions. Personal and Ubiquitous Computing 10(1), 50–54 (2006)
Čapkun, S., Hubaux, J.P., Buttyán, L.: Mobility Helps Security in Ad Hoc Networks. In: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 46–56. ACM, New York (2003)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)
Uddin, M.G., Zulkernine, M.: ATM: an Automatic Trust Monitoring Algorithm for Service Software. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 1040–1044. ACM Press, New York (2009)
Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: Proceedings of the tenth ACM symposium on Access control models and technologies, p. 158. ACM, New York (2005)
Etalle, S., Winsborough, W.H.: Integrity constraints in trust management. In: Proceedings of the tenth ACM symposium on Access control models and technologies, p. 10. ACM, New York (2005)
Spanoudakis, G., Kloukinas, C., Androutsopoulos, K.: Towards Security Monitoring Patterns. In: Proceedings of the 2007 ACM symposium on Applied computing, p. 1525. ACM, New York (2007)
Jurca, R., Faltings, B., Binder, W.: Reliable QoS monitoring based on client feedback. In: Proceedings of the 16th international conference on World Wide Web, p. 1012. ACM, New York (2007)
Baresi, L., Ghezzi, C., Guinea, S.: Smart monitors for composed services. In: Proceedings of the 2nd international conference on Service oriented computing, pp. 193–202. ACM, New York (2004)
Skene, J., Skene, A., Crampton, J., Emmerich, W.: The monitorability of service-level agreements for application-service provision. In: Proceedings of the 6th international Workshop on Software and Performance, p. 14. ACM, New York (2007)
Letia, I.A., Marginean, A., Groza, A.: Z-Based Agents for Service Oriented Computing. In: Huang, J., Kowalczyk, R., Maamar, Z., Martin, D., Müller, I., Stoutenburg, S., Sycara, K. (eds.) SOCASE 2007. LNCS, vol. 4504, pp. 160–174. Springer, Heidelberg (2007)
Yan, Y., Cordier, M.O., Pencole, Y., Grastien, A.: MonitoringWeb Service Networks in a Model-based Approach. In: Proceedings of the Third European Conference on Web Services, p. 192. IEEE Computer Society, Los Alamitos (2005)
Sahai, A., Machiraju, V., Wursterl, K.: Monitoring and Controlling Internet Based E-Services. In: Proceedings of the Second IEEE Workshop on Internet Applications. IEEE Computer Society, Washington (2001)
Robinson, W.N.: Monitoring web service requirements. In: Proceedings of the 11th IEEE International Conference on Requirements Engineering, p. 65. IEEE, Los Alamitos (2003)
Zhang, Y., Lin, K.J., Hsu, J.Y.J.: Accountability monitoring and reasoning in service-oriented architectures. In: Proceedings of Service Oriented Computing and Applications, vol. 1, pp. 35–50. Springer, Heidelberg (2007)
Fukuju, Y., Minami, M., Morikawa, H., Aoyama, T.: DOLPHIN: An autonomous indoor positioning system in ubiquitous computing environment. In: Proceedings of IEEE Workshop on Software Technologies for Future Embedded Systems, vol. 53, p. 56. IEEE, Los Alamitos (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jia, L., Nixon, P. (2010). A New Monitor Model for Enhancing Trust-Based Systems. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)