Towards a dynamic and composite model of trust

Adam J. Lee, Ting Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area. In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems. In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages. We then present the design and semantics of CTM: a flexible policy language that allows arbitrary composition of horizontal and vertical trust metrics. After showing that CTM embodies each of the requirements discovered during our use case analysis, we demonstrate that CTM can be used to specify a wide range of interesting composite trust management policies, and comment on several systems challenges that arise during the composite trust management process.

Original languageEnglish
Title of host publicationProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
Pages217-226
Number of pages10
DOIs
Publication statusPublished - 30 Nov 2009
Externally publishedYes
Event14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009 - Stresa, Italy
Duration: 3 Jun 20095 Jun 2009

Other

Other14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009
CountryItaly
CityStresa
Period3/6/095/6/09

Fingerprint

Composite materials
Distributed computer systems
Chemical analysis
Decision making
Semantics
Specifications

Keywords

  • Credentials
  • Policy
  • Reputation
  • Trust

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Information Systems

Cite this

Lee, A. J., & Yu, T. (2009). Towards a dynamic and composite model of trust. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT (pp. 217-226) https://doi.org/10.1145/1542207.1542242

Towards a dynamic and composite model of trust. / Lee, Adam J.; Yu, Ting.

Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2009. p. 217-226.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, AJ & Yu, T 2009, Towards a dynamic and composite model of trust. in Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. pp. 217-226, 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, 3/6/09. https://doi.org/10.1145/1542207.1542242
Lee AJ, Yu T. Towards a dynamic and composite model of trust. In Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2009. p. 217-226 https://doi.org/10.1145/1542207.1542242
Lee, Adam J. ; Yu, Ting. / Towards a dynamic and composite model of trust. Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2009. pp. 217-226
@inproceedings{d702c85b5da9497fa4dd0d028b3906ea,
title = "Towards a dynamic and composite model of trust",
abstract = "During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area. In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems. In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages. We then present the design and semantics of CTM: a flexible policy language that allows arbitrary composition of horizontal and vertical trust metrics. After showing that CTM embodies each of the requirements discovered during our use case analysis, we demonstrate that CTM can be used to specify a wide range of interesting composite trust management policies, and comment on several systems challenges that arise during the composite trust management process.",
keywords = "Credentials, Policy, Reputation, Trust",
author = "Lee, {Adam J.} and Ting Yu",
year = "2009",
month = "11",
day = "30",
doi = "10.1145/1542207.1542242",
language = "English",
isbn = "9781605585376",
pages = "217--226",
booktitle = "Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT",

}

TY - GEN

T1 - Towards a dynamic and composite model of trust

AU - Lee, Adam J.

AU - Yu, Ting

PY - 2009/11/30

Y1 - 2009/11/30

N2 - During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area. In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems. In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages. We then present the design and semantics of CTM: a flexible policy language that allows arbitrary composition of horizontal and vertical trust metrics. After showing that CTM embodies each of the requirements discovered during our use case analysis, we demonstrate that CTM can be used to specify a wide range of interesting composite trust management policies, and comment on several systems challenges that arise during the composite trust management process.

AB - During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area. In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems. In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages. We then present the design and semantics of CTM: a flexible policy language that allows arbitrary composition of horizontal and vertical trust metrics. After showing that CTM embodies each of the requirements discovered during our use case analysis, we demonstrate that CTM can be used to specify a wide range of interesting composite trust management policies, and comment on several systems challenges that arise during the composite trust management process.

KW - Credentials

KW - Policy

KW - Reputation

KW - Trust

UR - http://www.scopus.com/inward/record.url?scp=70450247023&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70450247023&partnerID=8YFLogxK

U2 - 10.1145/1542207.1542242

DO - 10.1145/1542207.1542242

M3 - Conference contribution

AN - SCOPUS:70450247023

SN - 9781605585376

SP - 217

EP - 226

BT - Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

ER -