Skip to main content

A trust policy framework

  • Session 6: Security Evaluation
  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Abstract

This paper describes a formal framework for implementing trust policies in security systems. It consists of a model for representing opinions about trust and a set of operations to manipulate these opinions and to make decisions.

This research was supported by Norwegian Research Council Grant No.116417/410.

This research was carried out while the author was visiting the ISRC at QUT.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.F. Baldwin. Support logic programming. In A.I Jones et al., editors, Fuzzy Sets: Theory and Applications, Dordrecht, 1986. Reidel.

    Google Scholar 

  2. Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA, 1996.

    Google Scholar 

  3. A. Jøsang. The right type of trust for distributed systems. In C. Meadows, editor, Proc. of the 1996 New Security Paradigms Workshop. ACM, 1996.

    Google Scholar 

  4. A. Jøsang. Prospectives for modelling trust in information security. In Vijay Varadharajan, editor, Proceedings of the 1997 Australasian Conference on Informatiojn Security and Privacy. Springer-Verlag, 1997.

    Google Scholar 

  5. P. Lucas and L. Van Der Gaag. Principles of Expert Systems. Addison-Wesley Publishing Company, 1991.

    Google Scholar 

  6. Henry Prade. A combinational approach to approximate and plausible reasoning with applications to expert systems. IEEE Trans. on PAMI, 7(3):260–283, 1985.

    Google Scholar 

  7. Michael K. Reiter and Stuart G Stubblebin. Toward acceptable metrics of authentication. In Proceedings of the 1997 IEEE Conference on Security and Privacy, Oakland, CA, 1997.

    Google Scholar 

  8. G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, 1976.

    Google Scholar 

  9. L.A. Zadeh. Review of Shafer's A mathematical theory of evidence. AI Magazine, 5:81–83, 1984.

    Google Scholar 

  10. P.R. Zimmermann. The Official PGP User's Guide. MIT Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Jøsang, A. (1997). A trust policy framework. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028475

Download citation

  • DOI: https://doi.org/10.1007/BFb0028475

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics