Trust Management Survey

Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in computer-assisted collaboration and electronic commerce in particular. A computational model of trust and its implementation can alleviate this problem. This survey is directed to an audience wishing to familiarize themselves with the field, for example to locate a research target or implement a trust management system. It concentrates on providing a general overview of the state of the art, combined with examples of things to take into consideration both when modelling trust in general and building a solution for a certain phase in trust management, be it trust relationship initialization, updating trust based on experience or determining what trust should have an effect on.

[1]  Lea Viljanen,et al.  The TuBE approach to trust management , 2005 .

[2]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[3]  Heiko Krumm,et al.  Trust-adapted enforcement of security policies in distributed component-structured applications , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[4]  Marek Sergot,et al.  Revocation in the privilege calculus , 2003 .

[5]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[6]  Erik Rissanen Server based application level authorisation for Rotor , 2003, IEE Proc. Softw..

[7]  Klaus Herrmann,et al.  Statistical Trustability (Conceptual Work) , 2003, iTrust.

[8]  Michael Grimsley,et al.  Managing Internet-Mediated Community Trust Relations , 2004, iTrust.

[9]  K. Suzanne Barber,et al.  Challenges for Trust, Fraud and Deception Research in Multi-agent Systems , 2002, Trust, Reputation, and Security.

[10]  Youngkee Kim How Do People Evaluate a Web Site's Credibility , 2007 .

[11]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[12]  Paddy Nixon,et al.  A formal model of trust lifecycle management , 2003 .

[13]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[14]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[15]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[16]  Simon Shiu,et al.  Hardware Security Appliances for Trust , 2003, iTrust.

[17]  Catholijn M. Jonker,et al.  Human Experiments in Trust Dynamics , 2004, iTrust.

[18]  Audun Jøsang,et al.  Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.

[19]  Evangelos Kotsovinos,et al.  Pinocchio: Incentives for Honest Participation in Distributed Trust Management , 2004, iTrust.

[20]  Jorge Lobo,et al.  Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.

[21]  Roberto Chinnici,et al.  Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language , 2007 .

[22]  Lea Kutvonen Automated management of inter-organisational applications , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.

[23]  Ketil Stølen,et al.  Using Risk Analysis to Assess User Trust: A Net-Bank Scenario , 2004, iTrust.

[24]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[25]  Giovanni Della-Libera,et al.  Web Services Trust Language (WS-Trust) , 2002 .

[26]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[27]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[28]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[29]  Daniel J. Essin,et al.  Patterns of trust and policy , 1998, NSPW '97.

[30]  Sotirios Terzis,et al.  Engineering Trust Based Collaborations in a Global Computing Environment , 2004, iTrust.

[31]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[32]  Morris Sloman,et al.  Specifying and Analysing Trust for Internet Applications , 2002, I3E.

[33]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[34]  Jaap Gordijn,et al.  Designing and evaluating e-business models , 2001 .

[35]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[36]  Theodosis Dimitrakos,et al.  Towards Dynamic Security Perimeters for Virtual Collaborative Networks , 2004, iTrust.

[37]  Yao-Hua Tan A Trust Matrix Model for Electronic Commerce , 2003, iTrust.

[38]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[39]  Robert Demolombe,et al.  Reasoning About Trust: A Formal Logical Framework , 2004, iTrust.

[40]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[41]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[42]  Jaap Gordijn,et al.  Modeling Controls for Dynamic Value Exchanges in Virtual Organizations , 2004, iTrust.

[43]  Audun Jøsang,et al.  Analysing the Relationship between Risk and Trust , 2004, iTrust.

[44]  Jeffrey M. Bradshaw,et al.  Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.

[45]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[46]  Jeffrey M. Bradshaw,et al.  KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services , 2004, iTrust.

[47]  Philipp Obreiter A Case for Evidence-Aware Distributed Reputation Systems: Overcoming the Limitations of Plausibility Considerations , 2004, iTrust.

[48]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[49]  Yücel Karabulut,et al.  Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model , 2003, iTrust.

[50]  Yong Chen,et al.  Trust Propagation in Small Worlds , 2003, iTrust.

[51]  Florian N. Egger,et al.  "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.

[52]  R. Sekar,et al.  Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.

[53]  John Mylopoulos,et al.  The Semantic Web - ISWC 2003 , 2003, Lecture Notes in Computer Science.

[54]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[55]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[56]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[57]  Ellen R. Tauber,et al.  How Do People Evaluate a Web Site's Credibility? , 2002 .

[58]  David M. Booth,et al.  Web Services Architecture , 2004 .

[59]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[60]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[61]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[62]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[63]  Jeffrey M. Bradshaw,et al.  KAoS: An Open Agent Architecture Support-ing Reuse, Interoperability, and Extensibility , 1996 .

[64]  Rino Falcone,et al.  Trust, Reputation, and Security: Theories and Practice , 2003, Lecture Notes in Computer Science.

[65]  Darren P. Mundy,et al.  Trust Development and Management in Virtual Communities , 2004, iTrust.

[66]  H. S. Teng,et al.  Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[67]  Eugene H. Spafford,et al.  Using internal sensors for computer intrusion detection , 2001 .

[68]  Fn Florian Egger FROM INTERACTIONS TO TRANSACTIONS: Designing the Trust Experience for Business-to-Consumer Electronic Commerce , 2003 .