Abstract
This paper describes a formal framework for implementing trust policies in security systems. It consists of a model for representing opinions about trust and a set of operations to manipulate these opinions and to make decisions.
This research was supported by Norwegian Research Council Grant No.116417/410.
This research was carried out while the author was visiting the ISRC at QUT.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
J.F. Baldwin. Support logic programming. In A.I Jones et al., editors, Fuzzy Sets: Theory and Applications, Dordrecht, 1986. Reidel.
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA, 1996.
A. Jøsang. The right type of trust for distributed systems. In C. Meadows, editor, Proc. of the 1996 New Security Paradigms Workshop. ACM, 1996.
A. Jøsang. Prospectives for modelling trust in information security. In Vijay Varadharajan, editor, Proceedings of the 1997 Australasian Conference on Informatiojn Security and Privacy. Springer-Verlag, 1997.
P. Lucas and L. Van Der Gaag. Principles of Expert Systems. Addison-Wesley Publishing Company, 1991.
Henry Prade. A combinational approach to approximate and plausible reasoning with applications to expert systems. IEEE Trans. on PAMI, 7(3):260–283, 1985.
Michael K. Reiter and Stuart G Stubblebin. Toward acceptable metrics of authentication. In Proceedings of the 1997 IEEE Conference on Security and Privacy, Oakland, CA, 1997.
G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, 1976.
L.A. Zadeh. Review of Shafer's A mathematical theory of evidence. AI Magazine, 5:81–83, 1984.
P.R. Zimmermann. The Official PGP User's Guide. MIT Press, 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Jøsang, A. (1997). A trust policy framework. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028475
Download citation
DOI: https://doi.org/10.1007/BFb0028475
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive