On the concept of trust

Considerable diversity is exhibited by current definitions of the concept of trust. This paper argues that there may nevertheless be an identifiable core to the concept. On the basis of an analysis of five scenarios in which some agent x trusts some other agent y, it is suggested that two beliefs--here called the 'rule-belief' and the 'conformity-belief'--form the core of the trusting attitude. The informal account of trust presented here identifies the kinds of modalities that would figure in a modal-logical specification of the conditions under which one agent can be said to trust another.

[1]  Bernard Barber,et al.  The Logic and Limits of Trust , 1983 .

[2]  Jr. Hanna Stair,et al.  Quantitative Analysis for Management , 1982 .

[3]  P. Venkat Rangan,et al.  An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[4]  Audun Jøsang,et al.  PKI Seeks a Trusting Relationship , 2000, ACISP.

[5]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[6]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[7]  Andrew J. I. Jones,et al.  RESPONSIBILITY FOR ACTION IN ORGANISATIONS: A FORMAL MODEL , 2003 .

[8]  Ben Shneiderman,et al.  Designing trust into online experiences , 2000, CACM.

[9]  Yao-Hua Tan,et al.  Toward a Generic Model of Trust for Electronic Commerce , 2000, Int. J. Electron. Commer..

[10]  Michael K. Reiter,et al.  Path independence for authentication in large-scale systems , 1997, CCS '97.

[11]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[12]  J. Lewis,et al.  SOCIAL ATOMISM, HOLISM, AND TRUST , 1985 .

[13]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[14]  B. J. Fogg,et al.  Credibility and computing technology , 1999, CACM.

[15]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[16]  Tadayoshi Kohno,et al.  Trust (and mistrust) in secure applications , 2001, CACM.

[17]  Reihaneh Safavi-Naini,et al.  Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.

[18]  R. Tuomela,et al.  Contemporary Action Theory , 1997 .

[19]  Diego Gambetta,et al.  Trust as type detection , 2001 .

[20]  Ueli Maurer,et al.  Reasoning about public-key certification: on bindings between entities and public keys , 2000, IEEE J. Sel. Areas Commun..

[21]  Markus Jakobsson,et al.  On Assurance Structures for WWW Commerce , 1998, Financial Cryptography.

[22]  Thomas Beth,et al.  Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..

[23]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[24]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[25]  Markus Jakobsson,et al.  Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System , 1997, Financial Cryptography.

[26]  P J Skevington From security to trust-creating confidence to trade electronically , 1998 .

[27]  A. Abdul-Rahman,et al.  Relying on trust to find reliable information , 1999 .

[28]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[29]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[30]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[31]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[32]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[33]  Catherine A. Meadows,et al.  The Role of Trust in Information Integrity Protocols , 1995, J. Comput. Secur..

[34]  David Lewis Convention: A Philosophical Study , 1986 .

[35]  A. Jøsang TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .

[36]  Audun Jøsang,et al.  Authentication for Humans , 2001 .

[37]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[38]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[39]  A. Koller,et al.  Speech Acts: An Essay in the Philosophy of Language , 1969 .

[40]  Joan Feigenbaum,et al.  A practically implementable and tractable delegation logic , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[41]  Andrew J. I. Jones Communication and Meaning: An Essay in Applied Modal Logic , 1983 .

[42]  N. L. Chervany,et al.  What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .

[43]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[44]  Erik Stenius Mood and Language-Game , 1967 .

[45]  Matt Bishop,et al.  The Solar Trust Model: authentication without limitation , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[46]  Pekka Nikander,et al.  Certifying Trust , 1998, Public Key Cryptography.

[47]  Eric M. Uslaner,et al.  Social capital and the net , 2000, CACM.

[48]  Angelos D. Keromytis,et al.  Trust Management and Network Layer Security Protocols , 1999, Security Protocols Workshop.

[49]  Marek J. Sergot,et al.  A Formal Characterisation of Institutionalised Power , 1996, Log. J. IGPL.

[50]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[51]  Ueli Maurer,et al.  Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.

[52]  Michael K. Reiter,et al.  Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[53]  Audun Jøsang,et al.  A Subjective Metric of Authentication , 1998, ESORICS.

[54]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[55]  G. Elofson Developing Trust with Intelligent Agents: An Exploratory Study , 2001 .

[56]  Pekka Nikander,et al.  Policy and Trust in Open Multi-Operator Networks , 2000, SMARTNET.

[57]  Dean Povey,et al.  Developing Electronic Trust Policies Using a Risk Management Model , 1999, CQRE.

[58]  Warwick Ford,et al.  Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 1999, RFC.

[59]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[60]  K. Giffin The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. , 1967, Psychological bulletin.

[61]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[62]  Ronald Fagin,et al.  Belief, Awareness, and Limited Reasoning. , 1987, Artif. Intell..

[63]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[64]  T. Rea,et al.  Engendering trust in elctronic environments: roles for a trusted third party , 2001 .

[65]  Andrew J. I. Jones,et al.  Trust and Deception in Virtual Societies , 2001 .

[66]  Babak Sadighi Firozabadi,et al.  On the characterisation of a trusting agent - aspects of a formal approach , 2001 .

[67]  H. Raiffa,et al.  Decisions with Multiple Objectives , 1993 .

[68]  S. French Value‐focused thinking: A path to creative decision making, Keeney, R. L., Cambridge, MA: Harvard University Press, 1992, ISBN 0‐674‐93197‐1 , 1993 .

[69]  Timothy Paul Cronan,et al.  Making ethical decisions , 2000, CACM.

[70]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.