A trust protocol for community collaboration

In ambient environments, new security challenges that are not adequately addressed by existing security models appear. In such context, intelligent communication devices participate to spontaneous and self-organized networks where unexpected interactions with unknown devices take place. Without centralized organization, security turns in a risk management problem.

[1]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[2]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Diego Gambetta Can We Trust Trust , 2000 .

[4]  Licia Capra,et al.  Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.

[5]  Timothy W. Finin,et al.  In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[6]  Daniele Quercia,et al.  TATA: Towards Anonymous Trusted Authentication , 2006, iTrust.

[7]  Adam Rifkin,et al.  Weaving a Web of trust , 1997, World Wide Web J..

[8]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[9]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[10]  Jordi Sabater-Mir,et al.  Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.

[11]  Jordi Sabater-Mir,et al.  REGRET: reputation in gregarious societies , 2001, AGENTS '01.

[12]  G. Suryanarayana,et al.  A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications , 2004 .

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Ramon Sangüesa,et al.  Extracting reputation in multi agent systems by means of social network topology , 2002, AAMAS '02.

[15]  Marine Minier,et al.  Cryptographic Protocol to Establish Trusted History of Interactions , 2006, ESAS.

[16]  Stéphane Ubéda,et al.  Trusted Ambient community for self-securing hybrid networks , 2003 .

[17]  Kwangjo Kim,et al.  A New ID-based Group Signature Scheme from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..