Skip to main content

A Task Ordering Approach for Automatic Trust Establishment

  • Conference paper
Engineering Secure Software and Systems (ESSoS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7159))

Included in the following conference series:

Abstract

Trust has become essential in computer science as a way of assisting the process of decision-making, such as access control. In any system, several tasks may be performed, and each of these tasks might pose different associated trust values between the entities of the system. For instance, in a file system, reading and overwriting a file are two tasks that pose different trust values between the users who can carry out them. In this paper, we propose a model for automatically establishing trust relationships between entities considering an established order among tasks.

The research leading to these results have received funding from the European Community’s Seventh Framework Programme FP7/2007-2013 as part of the Network of Excellence NESSoS (www.nessos-project.eu) under grant agreement number 256980. The first author is funded by the Spanish Ministry of Education through the National F.P.U. Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NESSoS FP7 Project: Network of Excellence on Engineering Secure Future Internet Software Services and Systems, http://www.nessos-project.eu/

  2. Selection and Documentation of the Two Major Application Case Studies. NESSoS Deliverable 11.2 (October 2011)

    Google Scholar 

  3. Agudo, I., Fernandez-Gago, C., Lopez, J.: A Model for Trust Metrics Analysis. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol. 5185, pp. 28–37. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Brændeland, G., Stølen, K.: Using Risk Analysis to Assess user Trust: A Net-Bank Scenario. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 146–160. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  MATH  Google Scholar 

  6. Gil, Y., Artz, D.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2) (2011)

    Google Scholar 

  7. Hasan, O., Brunie, L., Pierson, J.-M., Bertino, E.: Elimination of Subjectivity from Trust Recommendation. In: The 3rd IFIP International Conference on Trust Management (TM 2009), pp. 65–80 (June 2009)

    Google Scholar 

  8. Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia (June 2002)

    Google Scholar 

  9. Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43, 618–644 (2007)

    Article  Google Scholar 

  10. Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2003)

    Google Scholar 

  11. Li, Y., Sun, H., Chen, Z., Ren, J., Luo, H.: Using trust and risk in access control for grid environment. In: Proceedings of the 2008 International Conference on Security Technology, SECTECH 2008, pp. 13–16. IEEE Computer Society, Washington, DC, USA (2008)

    Google Scholar 

  12. Li, Y., Zhao, M., Sun, H., Chen, Z.: A trust and risk framework to enhance reliable interaction in e-commerce. In: IEEE International Conference on E-Business Engineering, pp. 475–480 (2008)

    Google Scholar 

  13. Seo, Y., Han, S.: Local scalar trust metrics with a fuzzy adjustment method. TIIS 4(2), 138–153 (2010)

    Google Scholar 

  14. Toahchoodee, M., Xie, X., Ray, I.: Towards Trustworthy Delegation in Role-Based Access Control Model. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 379–394. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. World Health Organization. eHealth Tools and Services: Needs of Member States (2006)

    Google Scholar 

  16. Zhang, M., Yang, B., Zhu, S., Zhang, W.: Ordered semiring-based trust establish model with risk evaluating. I. J. Network Security 8(2), 101–106 (2009)

    Google Scholar 

  17. Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)

    Google Scholar 

  18. Ziegler, C.-N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers 7(4-5), 337–358 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gilles Barthe Benjamin Livshits Riccardo Scandariato

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moyano, F., Fernandez-Gago, C., Agudo, I., Lopez, J. (2012). A Task Ordering Approach for Automatic Trust Establishment. In: Barthe, G., Livshits, B., Scandariato, R. (eds) Engineering Secure Software and Systems. ESSoS 2012. Lecture Notes in Computer Science, vol 7159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28166-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28166-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28165-5

  • Online ISBN: 978-3-642-28166-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics