Trust Transfer in Distributed Systems

Trust transfer is a common technique employed in trust management systems to establish relationships between parties that are strangers. It is also well known that trust is not always transferable. That is, given an existing trust relationship, it may or may not be possible to derive new trust from it. In particular, it is not known under which constraints trust is transferable. In this paper we investigate trust transfer and identify when trust is transferable. Our analysis starts with a simple trust model. By using the model, we find that trust transfer is related to trust policy entailment. We then present a modal logic system which captures how trust and beliefs evolve in distributed systems. With the modal logic system we identify the key constraints on trust transfer regarding the communication between the trustor and the recommender and the trustor’s belief state

[1]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[2]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[3]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[4]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[5]  Joseph Y. Halpern,et al.  A Knowledge-Based Framework for Belief change, Part I: Foundations , 1994, TARK.

[6]  Audun Jsang,et al.  Analysing topologies of transitive trust , 2003 .

[7]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[8]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[9]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[10]  N. Malcolm On Knowledge and Belief , 1954 .

[11]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[12]  Martín Abadi,et al.  A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.

[13]  Munindar P. Singh,et al.  Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[14]  P. Venkat Rangan,et al.  An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[15]  Churn-Jung Liau,et al.  Belief, information acquisition, and trust in multi-agent systems--A modal logic formulation , 2003, Artif. Intell..

[16]  C. Guarneri Cornell University Press , 1991 .

[17]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[18]  Wiebe van der Hoek Systems for Knowledge and Beliefs , 1990, JELIA.

[19]  Andreas Birk,et al.  Learning to Trust , 2000, Trust in Cyber-societies.

[20]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[21]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).