Abstract
Trust transfer is a common technique employed in trust management systems to establish relationships between parties that are strangers. It is also well known that trust is not always transferable. That is, given an existing trust relationship, it may or may not be possible to derive new trust from it. In particular, it is not known under which constraints trust is transferable. In this paper we investigate trust transfer and identify when trust is transferable. Our analysis starts with a simple trust model. By using the model, we find that trust transfer is related to trust policy entailment. We then present a modal logic system which captures how trust and beliefs evolve in distributed systems. With the modal logic system we identify the key constraints on trust transfer regarding the communication between the trustor and the recommender and the trustor’s belief state
Please use the following format when citing this chapter: Dong, C., Russello, G. and Dulay. N., 2007, in IFIP Internationa! Federation for Information Processing, Volume 238, Trust Management, eds. Etalle, S., Marsh, S., (Boston: Springer), pp. 17–29.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Blaze, J. Feigenbaum, and J. Lacy (1996) Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 164, IEEE Computer Society.
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, (Berkeley, CA), pp. 2–14.
N. Li, J. C. Mitchell, and W. H. Winsborough (2002) Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 114, IEEE Computer Society.
A. Jøsang, E. Gray, and M. Kinateder (2006) Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2):139–161.
A. Abdul-Rahman and S. Hailes (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, (New York, NY, USA), pp. 48–60, ACM Press.
B. Yu, M. P. Singh, and K. Sycara (2004) Developing trust in large-scale peer-to-peer systems. in: Proceedings of IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1–10.
C. M. Jonker and J. Treur (1999) Formal analysis of models for the dynamics of trust based on experiences. In F. J. Garijo and M. Boman (eds), vol. 1647 of Lecture Notes in Computer Science, pp. 221–231, Springer.
A. Birk (2000) Learning to trust. In: R. Falcone, M. P. Singh, and Y.-H. Tan (eds), vol. 2246 of Lecture Notes in Computer Science, pp. 133–144, Springer.
B. Christianson and W. S. Harbison (1997) Why isn’t trust transitive? In: Proceedings of the International Workshop on Security Protocols, (London, UK), pp. 171–176, Springer-Verlag.
E. Gerck (1998) Toward real-world models of trust. http://www.safevote.com/papers/trustdef.htm.
T. Grandison (2003) Trust Management for Internet Applications. PhD thesis, Imperial College London.
A. Jøsang and S. Pope (2005) Semantic constraints for trust transitivity. In: S. Hartmann and M. Stumptner (eds), vol. 43 of CRPIT, pp. 59–68, Australian Computer Society.
C. Castelfranchi and R. Falcone (1998) Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In: ICMAS, pp. 72–79, IEEE Computer Society.
P. V. Rangan (1988) An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 204–211, IEEE Computer Society.
M. Abadi and M. R. Tuttle (1991) A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201–216.
J. Hintikka (1962) Knowledge and Belief. Cornell University Press.
W. van der Hoek (1990) Systems for knowledge and beliefs. In: J. van Eijck (ed), vol. 478 of Lecture Notes in Computer Science, pp. 267–281, Springer.
N. Friedman and J. Y. Halpern (1994) A knowledge-based framework for belief change, part I: Foundations. In: R. Fagin (ed), TARK, pp. 44–64, Morgan Kaufmann.
S. Kripke (1963) Semantical considerations on modal logic. Acta Philosophica Fennica, 16:83–94.
A. Jøsang (1999) An algebra for assessing trust in certification chains. In: NDSS 99, The Internet Society.
A. Jøsang, E. Gray, and M. Kinateder (2003) Analysing Topologies of Transitive Trust. In: T. Dimitrakos and F. Martinelli (eds) Proceedings of the First International Workshop on Formal Aspects in Security and Trust, (Pisa, Italy), pp. 9–22.
B. F. Chellas (1988) Modal logic: an introduction. Cambridge University Press.
C.-J. Liau (2003) Belief, information acquisition, and trust in multi-agent systems-a modal logic formulation. In: Artif. Intell., 149(1):31–60.
The CareGrid project. http://www.caregrid.org.
The Ponder2 project. http://www.ponder2.net.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Dong, C., Russello, G., Dulay, N. (2007). Trust Transfer in Distributed Systems. In: Etalle, S., Marsh, S. (eds) Trust Management. IFIPTM 2007. IFIP International Federation for Information Processing, vol 238. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73655-6_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-73655-6_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73654-9
Online ISBN: 978-0-387-73655-6
eBook Packages: Computer ScienceComputer Science (R0)