Abstract
Trust management seems a promising approach for dealing with security concerns in collaborative applications in a global computing environment. However, the characteristics of this environment require a move from reliable identification to mechanisms for the recognition of entities. Furthermore, they require explicit reasoning about the risks of interactions, and a notion of uncertainty in the underlying trust model. From our experience of engineering collaborative applications in such an environment, we found that the relationship between trust and risk is a fundamental issue. In this paper, as an initial step towards an engineering approach for the development of trust based collaborative applications, we focus on the relationship between trust and risk, and explore alternative views of this relationship. We also exemplify how particular views can be exploited in two particular application scenarios. This paper builds upon our previous work in developing a general model for trust based collaborations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference on System Sciences (January 2000)
Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, Springer, Heidelberg (1998)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Conference on Security and Privacy. AT&T (May 1996)
Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: International Conference on Software Engineering and Formal Methods (September 2003)
Chen, R., Yeager, W.: Poblano - a distributed trust model for peer-to-peer networks (2001)
Dimitrakos, T.: System models, e-risks and e-trust. towards bridging the gap? In: 1st IFIP Conference on e-Commerce, e-Business, e-Government, Kluwer Academic Publishers, Dordrecht (October 2001)
English, C., Terzis, S., Wagealla, W., Nixon, P., Lowe, H., McGettrick, A.: Trust dynamics for collaborative global computing. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises: Enterprise Security (Special Session on Trust Management) (2003)
English, C., Wagealla, W., Nixon, P., Terzis, S., McGettrick, A., Lowe, H.: Trusting collaboration in global computing. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 136–149. Springer, Heidelberg (2003)
Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, Oxford, pp. 213–237. Basil Blackwell (1990)
Grandison, T., Sloman, M.: Trust management tools for internet applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 91–107. Springer, Heidelberg (2003)
Global Computing Initiative (2002) Website, http://www.cordis.lu/ist/fet/gc.htm
Kagal, L., Undercoffer, J.L., Perich, F., Joshi, A., Finin, T.: A security architecture based on trust management for pervasive computing systems. In: Grace Hopper Celebration of Women in Computing (October 2002)
Kerberos. Website, http://web.mit.edu/kerberos/www/
Li, N., Mitchell, J.C.: RT: A role based trust management framework. In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), April 2003, IEEE Computer Society Press, Los Alamitos (2003)
McLean, J.: Security models. In: Marciniak, J. (ed.) Encyclopedia of Software Engineering, John Wiley & Sons, Chichester (1994)
Sandhu, R.: Access control: The neglected frontier. In: First Australian Conference on Information Security and Privacy (1996)
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002) (June 2002)
Seigneur, J.-M., Farrell, S., Jensen, C., Gray, E., Yong, C.: End-to-end trust starts with recognition. In: First International Conference on Security in Pervasive Computing (2003)
Terzis, S., Wagealla, W., English, C., Nixon, P.: The secure collaboration model. Technical Report 03, University of Strathclyde, Computer and Information Sciences (December 2003)
Wagealla, W., Carbone, M., English, C., Terzis, S., Nixon, P.: A formal model of trust lifecycle management. In: Workshop on Formal Aspects of Security and Trust (FAST 2003) at FM 2003 (September 2003)
Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: ACM Conference on Electronic Commerce (2003)
Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: 1st International Joint Conference on Autonomous Agents and MultiAgent Systems (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
English, C., Terzis, S., Wagealla, W. (2004). Engineering Trust Based Collaborations in a Global Computing Environment. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-24747-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21312-3
Online ISBN: 978-3-540-24747-0
eBook Packages: Springer Book Archive