A New Monitor Model for Enhancing Trust-Based Systems

In recent years, with the rapid proliferation of new computing technologies, a variety of new computing environments have been introduced, such as decentralisation and mobility. The traditional security mechanisms are seen to be inadequate for these new environments. Trust is applied as a "soft security" to cope with new security concerns. Much research on trust systems has been carried out, it is important to identify the reliability of computational trust in different computing scenarios in order to make an enhancement. The reliability of trust systems for securing social interaction is demonstrated by showing the performance of the three trust-based systems under various scenarios in a pervasive computing environment. The focus of this paper is on enhancing trust-based systems and proposing a novel monitor model which supplements existing trust models.

[1]  J. Nievergelt,et al.  Special Feature: Monitoring Program Execution: A Survey , 1981, Computer.

[2]  Zakaria Maamar,et al.  Service-Oriented Computing: Agents, Semantics, and Engineering, AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings , 2007, SOCASE.

[3]  Ioan Alfred Letia,et al.  Z-Based Agents for Service Oriented Computing , 2007, SOCASE.

[4]  William N. Robinson,et al.  Monitoring Web service requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[5]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[6]  Ann Q. Gates,et al.  A taxonomy and catalog of runtime software-fault monitoring tools , 2004, IEEE Transactions on Software Engineering.

[7]  Boi Faltings,et al.  Reliable QoS monitoring based on client feedback , 2007, WWW '07.

[8]  Bin Luo,et al.  A framework for dynamic program analyzers , 1993, OOPSLA '93.

[9]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[10]  Timlynn T. Babitsky,et al.  Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications , 1993, OOPSLA 1993.

[11]  Mohammad Zulkernine,et al.  ATM: an automatic trust monitoring algorithm for service software , 2009, SAC '09.

[12]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[13]  Rizos Sakellariou,et al.  A taxonomy of grid monitoring systems , 2005, Future Gener. Comput. Syst..

[14]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[15]  Sandro Etalle,et al.  Integrity constraints in trust management , 2005, SACMAT '05.

[16]  Hiroyuki Morikawa,et al.  DOLPHIN: an autonomous indoor positioning system in ubiquitous computing environment , 2003, Proceedings IEEE Workshop on Software Technologies for Future Embedded Systems. WSTFES 2003.

[17]  Bernhard Plattner,et al.  Monitoring Program Execution: A Survey. , 1981 .

[18]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[19]  Alban Grastien,et al.  Monitoring Web service networks in a model-based approach , 2005, Third European Conference on Web Services (ECOWS'05).

[20]  Paola Lecca,et al.  A new probabilistic generative model of parameter inference in biochemical networks , 2009, SAC '09.

[21]  Michael Collins,et al.  Evaluating Trust-Based Access Control for Social Interaction , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[22]  Hisham M. Haddad,et al.  Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007 , 2007, SAC.

[23]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[24]  George Spanoudakis,et al.  Towards security monitoring patterns , 2007, SAC '07.

[25]  Jane Yung-jen Hsu,et al.  Accountability monitoring and reasoning in service-oriented architectures , 2007, Service Oriented Computing and Applications.

[26]  Akhil Sahai,et al.  Monitoring and controlling Internet based e-services , 2001, Proceedings. The Second IEEE Workshop on Internet Applications. WIAPP 2001.

[27]  Paddy Nixon,et al.  Towards self-protecting ubiquitous systems: monitoring trust-based interactions , 2005, Personal and Ubiquitous Computing.

[28]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[29]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[30]  Karsten Schwan,et al.  Falcon: on-line monitoring and steering of large-scale parallel programs , 1995, Proceedings Frontiers '95. The Fifth Symposium on the Frontiers of Massively Parallel Computation.

[31]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[32]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[33]  Luciano Baresi,et al.  Smart monitors for composed services , 2004, ICSOC '04.

[34]  Frank Stajano Security in Pervasive Computing , 2003, SPC.