Abstract
Trust is a critical issue for communication protocols in open systems that operate in dynamic and highly uncertain environments. It influences not only the specification of security policies but also the techniques needed to manage and implement security policies. A formal system for the specification of trust for such systems requires the ability to reason about agent beliefs as well as the evolution of the system through time. In this paper, we use a fibred logic called FL which is obtained by combining a belief logic with a temporal logic for specifying agent beliefs and establishing trust theories for communication protocols. A theory of trust for a given system is captured by a set of rules in FL that describes the trust of agents in the system. This enables automated reasoning about theories of trust using the decision procedures of FL such as axiom systems and tableaux. Theories of trust are generally established based on the initial trust of agents in the security mechanisms of the system in which they are deployed. Such theories provide a foundation for reasoning about agent beliefs as well as security properties that systems may satisfy.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Computer Society Symposium on research in Security and Privacy, pp. 164–173 (1996)
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Liu, C., Ozols, M.A.: Trust in secure communication systems – the concept, representations, and reasoning techniques. In: McKay, B., Slaney, J.K. (eds.) Canadian AI 2002. LNCS, vol. 2557, pp. 60–70. Springer, Heidelberg (2002)
Liu, C.: Logical foundations for reasoning about trust in secure digital communication. In: Stumptner, M., Corbett, D.R., Brooks, M. (eds.) Canadian AI 2001. LNCS, vol. 2256, pp. 333–344. Springer, Heidelberg (2001)
Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248. IEEE Computer Society Press, Los Alamitos (1990)
Oorschot, P.C.V.: Extending cryptographic logics of belief to key agreement protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 233–243. ACM Press, New York (1993)
Syverson, P.F., Oorschot, P.C.V.: A unified cryptographic protocol logic. NRL Publication (1996)
Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201–216 (1991)
Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57–63. IEEE Computer Society Press, Los Alamitos (1989)
Wedel, G., Kessler, V.: Formal semantics for authentication logics. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 219–241. Springer, Heidelberg (1996)
Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 150–164 (1993)
Boyd, C., Mao, W.: Designing secure key exchange protocols. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 93–105. Springer, Heidelberg (1994)
Bacchus, F., Grove, A.J., Halpern, J.Y., Koller, D.: From statistical knowledge bases to degrees of belief. CoRR cs.AI/0307056 (2003)
Gabbay, D., Pigozzi, G., Woods, J.: Controlled revision – an algorithmic approach for belief revision. Journal of Logic and Computation 12(1), 3–22 (2003)
Weydert, E.: Ranking revision reloaded. In: Formal Models of Belief Change in Rational Agents (2007)
Smets, P., Ristic, B.: Kalman filter and joint tracking and classification based on belief functions in the tbm framework. Information Fusion 8(1), 16–27 (2007)
Ma, J., Orgun, M.A.: Formalising theories of trust for authentication protocols. Information Systems Frontiers 10(1), 19–32 (2008)
Finger, M., Gabbay, D.M.: Adding a temporal dimension to a logic system. Journal of Logic, Language and Information 1, 203–233 (1992)
Liu, C., Ozols, M.A., Orgun, M.A.: A fibred belief logic for multiagent systems. In: Zhang, S., Jarvis, R. (eds.) AI 2005. LNCS, vol. 3809, pp. 29–38. Springer, Heidelberg (2005)
Orgun, M.A., Governatori, G., Liu, C.: Modal tableaux for verifying security protocols. In: Proceedings of the Formal Approaches to Multi-Agent Systems, FAMAS 2006, pp. 31–46. Riva del Garda, Italy (2006)
Orgun, M.A., Liu, C., Governatori, G.: Modal tableaux for verifying stream authentication protocols. Autonomous Agents and Multi-Agent Systems 19(1), 53–75 (2009)
Liu, C., Orgun, M.A.: Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation 22(5/6), 699–720 (1996)
Gabbay, D.M.: Fibring logics. Journal of Logic, Language and Information 9(4), 511–513 (2000)
Kracht, M., Wolter, F.: Properties of independently axiomatizable bimodal logics. The Journal of Symbolic Logic 56(4), 1469–1485 (1991)
Gabbay, D.M., Shehtman, V.B.: Products of modal logics, part 1. Logic Journal of the IGPL 6(1), 73–146 (1998)
Liu, C., Ozols, M.A., Orgun, M.A.: A temporalised belief logic for specifying the dynamics of trust for multi-agent systems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 142–156. Springer, Heidelberg (2004)
Liu, C., McLean, P., Ozols, M.A.: Combining logics for modelling security policies. In: ACSC, pp. 323–332 (2005)
Gabbay, D.M.: Fibring Logics. Oxford Logic Guides, vol. 38. Oxford University Press, Oxford (1998)
Orgun, M.A., Ma, J., Liu, C., Governatori, G.: Analysing stream authentication protocols in autonomous agent-based systems. In: Proceedings of the 2nd International Symposium on Dependable Autonomic and Secure Computing, pp. 325–332. IEEE Computer Society Press, Los Alamitos (2006)
Kripke, S.A.: Semantical considerations on modal logic. Acta Philosophica Fennica 16, 83–94 (1963)
Ma, J., Orgun, M.: Tableaux-based proof techniques for verifying multi-agent systems. In: Proceedings of the 2008 IEEE International Conference on Distributed Human-Machine Systems (DHMS). IEEE Computer Society Press, Los Alamitos (2008)
SPORE: Security protocols open repository (2009), http://www.lsv.ens-cachan.fr/Software/spore/ (last accessed April 14)
Anderson, R.J., Needham, R.M.: Programming satan’s computer. In: Computer Science Today, pp. 426–440 (1995)
Lowe, G.: A family of attacks upon authentication protocols. Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester (1997)
Steiner, J.G., Neuman, B.C., Schiller, J.: Kerberos: An authentication service for open network systems. In: Proceedings of the Winter 1988 Usenix Conference, pp. 191–202 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ma, J., Orgun, M.A., Sattar, A. (2009). Theories of Trust for Communication Protocols. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds) Autonomic and Trusted Computing. ATC 2009. Lecture Notes in Computer Science, vol 5586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02704-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-02704-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02703-1
Online ISBN: 978-3-642-02704-8
eBook Packages: Computer ScienceComputer Science (R0)