XenoTrust: event-based distributed trust management

This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks that span the full spectrum of distributed paradigms. We suggest that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving scalability.

[1]  Steven Hand,et al.  Managing Trust and Reputation in the XenoServer Open Platform , 2003, iTrust.

[2]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[3]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[4]  Hagit Attiya,et al.  Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). , 1993, PODC 1993.

[5]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[6]  Peter R. Pietzuch,et al.  A Framework for Event Composition in Distributed Systems , 2003, Middleware.

[7]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[8]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[9]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[10]  Steven Hand,et al.  Controlling the XenoServer Open Platform , 2003, 2003 IEEE Conference onOpen Architectures and Network Programming..

[11]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[12]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[13]  Fred B. Schneider,et al.  A Paradigm for Reliable Clock Synchronization , 1986 .

[14]  Pattie Maes,et al.  Kasbah: An Agent Marketplace for Buying and Selling Goods , 1996, PAAM.

[15]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[16]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[17]  Paul F. Syverson,et al.  A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.

[18]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[19]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.