skip to main content
10.1145/1519144.1519149acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

QuanTM: a quantitative trust management system

Published:31 March 2009Publication History

ABSTRACT

Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved. QuanTM, a QTM system, selectively combines elements from trust management and reputation management to create a novel method for policy evaluation. Trust management, while effective in managing access with delegated credentials (as in PolicyMaker and KeyNote), needs greater flexibility in handling situations of partial trust. Reputation management provides a means to quantify trust, but lacks delegation and policy enforcement.

This paper reports on QuanTM's design decisions and novel policy evaluation procedure. A representation of quantified trust relationships, the trust dependency graph, and a sample QuanTM application specific to the KeyNote trust management language, are also proposed.

References

  1. OpenBSD. http://www.openbsd.org.Google ScholarGoogle Scholar
  2. M. Abadi. Access control in a core calculus of dependency. ACM SIGPLAN Notices, 41(9):263--273, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Abadi, A. B. N. Heintze, and J. G. Riecke. A core calculus of dependency. In Proceedings of the 26th ACM Symposium on Principles of Programming Languages, pages 147--160, January 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Atkinson. Web services security (WS-Security). http://msdn.microsoft.com/library/default.asp? url=/library/en-us/dnglobspec/html/ws-security.asp, 2002.Google ScholarGoogle Scholar
  5. M. Y. Becker, C. Fournet, and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.Google ScholarGoogle Scholar
  6. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust-management system, version 2. IETF RFC, 2704:164--173, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). In Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, pages 59--63, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164--173. IEEE Computer Society, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Blaze, S. Kannan, A. D. Keromytis, I. Lee, W. Lee, O. Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Sp. Issue on Trust Mangement), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli. Fine grained access control with trust and reputation management for Globus. In GADA '07, volume 4804 of LNCS, pages 1505--1515, 2007. Google ScholarGoogle Scholar
  11. A. Jøsang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, 9(3):279--311, June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Jøsang, R. Hayward, and S. Pope. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Kagal, S. Cost, T. Finin, and Y. Peng. A framework for distributed trust management. In Proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, 2001.Google ScholarGoogle Scholar
  14. S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. D. Keromytis and J. M. Smith. Requirements for scalable access control and security management architectures. ACM Transactions on Internet Technology, 7(4), November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Li and M. Singhai. Trust management in distributed systems. IEEE Computer, 40(2):45--53, February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Li and J. Mitchell. RT: a role-based trust-management framework. DARPA Information Survivability Conference and Exposition, 2003. Proceedings, 1:201--212, April 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Liu and V. Issarny. Enhanced reputation mechanism for mobile ad hoc networks. LNCS, 2995:48--62, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  20. [email protected]. FreeBSD port keynote-2.3-1. http://www.freebsd.org/ports/security.html.Google ScholarGoogle Scholar
  21. G. Suryanarayana, J. R. Erenkrantz, and R. N. Taylor. An architectural approach for decentralized trust management. IEEE Internet Computing, 9(6):16--23, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Valdes, R. E. Tarjan, and E. L. Lawler. The recognition of series parallel digraphs. In Proceedings of the 11th Annual ACM Symposium on Theory of Computing, pages 1--12, Atlanta, GA, 1979. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. G. West, S. Kannan, I. Lee, and O. Sokolsky. An evaluation framework for reputation management systems. Working chapter for Trust Modeling and Management in Digital Environments: From Social Concept to System Development, (Zheng Yan, ed.).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    EUROSEC '09: Proceedings of the Second European Workshop on System Security
    March 2009
    57 pages
    ISBN:9781605584720
    DOI:10.1145/1519144

    Copyright © 2009 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 31 March 2009

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate47of113submissions,42%

    Upcoming Conference

    EuroSys '24
    Nineteenth European Conference on Computer Systems
    April 22 - 25, 2024
    Athens , Greece

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader