Abstract
Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by recommendation of other entities whose recommendations are known to be reliable. To consider an entity as being trustworthy, especially if there have been several mediators or contradicting recommendations, it is necessary to have a means of estimating its trustworthiness. In this paper we present a method for the valuation of trustworthiness which can be used to accept or reject an entity as being suitable for sensitive tasks. It constitutes an extension of the work of Yahalom, Klein and Beth ([YKB93]).
Chapter PDF
Similar content being viewed by others
References
M. Burrows, M. Abadi, R. Needham, “A Logic of Authentication”, Proc. of the 12 th ACM Symposium on Operating Systems Principles, Litchfield Park, Arizona, 1989. Published as ACM Operating Systems Review, 23 no 5 (1989).
M. Borcherding, “Ermittlung verschieden vertrauenswürdiger Pfade in offenen Netzen”, Diploma thesis at the European Institute for System Security, University of Karlsruhe, 1993 (in German).
L. Gong, R. Needham, R. Yahalom, “Reasoning about Belief in Cryptographic Protocols”, Proc. 1990 IEEE Symp. on Research in Security and Privacy, 234–248.
P. V. Rangan, “An Axiomatic Theory of Trust in Secure Communication Protocols”, Computers and Security 11 (1992) 163–172, Elsevier Science Publishers Ltd., Oxford 1992.
A. Tarah, Ch. Huitema, “Associating Metrics to Certification Paths”, Proceedings of the Second European Symposium on Research in Computer Security (ESORICS) 1992, 175–189, Springer LNCS 648, Berlin 1992.
R. Yahalom, B. Klein, Th. Beth, “Trust Relationships in Secure Systems — A Distributed Authentication Perspective”, Proc. 1993 IEEE Symp. on Research in Security and Privacy, 150–164.
R. Yahalom, B. Klein, Th. Beth, “Trust-based Navigation in Distributed Systems”, to appear in: Special issue “Security and Integrity of Open Systems” of the journal “Computing Systems”, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beth, T., Borcherding, M., Klein, B. (1994). Valuation of trust in open networks. In: Gollmann, D. (eds) Computer Security — ESORICS 94. ESORICS 1994. Lecture Notes in Computer Science, vol 875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58618-0_53
Download citation
DOI: https://doi.org/10.1007/3-540-58618-0_53
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58618-0
Online ISBN: 978-3-540-49034-0
eBook Packages: Springer Book Archive