Abstract
A significant characteristic of global computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction will function as expected. In this paper, we explore an architecture for interaction/collaboration in global computing systems. This architecture reflects the aspects of the trust lifecycle in three stages: trust formation, trust evolution and trust exploitation, forming a basis for risk assessment and interaction decisions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
EU Future Emerging Technologies, Global Computing Initiative. http://www.cordis.lu/ist/fetgc.htm
S. Marsh: “Formalising Trust as a Computational Concept”. Ph.D. Thesis, University of Stirling, 1994.
A. Abdul-Rahman: “The PGP Trust Model” Department of Computer Science, University College London, 1996.
C. English, P. Nixon, S. Terzis, A. McGettrick and H. Lowe: “Security Models for Trusting Network Appliances”. In Proceedings of the 5th IEEE International Workshop on Networked Appliances, pp 39–44 October 2002.
M. Carbone, O. Danvy, I. Damgaard, K. Krukow, A. Møller, J. B. Nielsen, M. Nielsen: “SECURE Deliverable 1.1: A Model For Trust”, December 2002.
J. Bacon, N. Dimmock, D. Ingram, K. Moody, B. Shand, A. Twigg: “SECURE Deliverable 3.1: Definition of Risk Model”, December 2002
J. M. Seigneur, S. Farrell, C. Jensen, E. Gray and C. Yong: “End-to-end trust in pervasive computing starts with recognition”. To appear in the Proceedings of the First International Conference on Security in Pervasive Computing, 2003.
U. Maurer: “Modelling a Public-Key Infrastructure”. In Proceedings of the 1996 European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 1146, pp. 325–350, 1996.
A. Jøsang: “The Consensus Operator for Combining Beliefs” Artificial Intelligence Journal, 142(1–2), p.157–170, Oct. 2002.
C. M. Jonker, J. Treur: “Formal Analysis of Models for the Dynamics of Trust Based on Experiences” Modelling Autonomous Agents in a Multi-Agent World 1999 European Workshop on Multi-Agent Systems. pp. 221–231, 1999.
C. Bryce, V. Cahill, G. Di Marzo Serugendo, C. English, S. Farrell, E. Gray, C. Jensen, P. Nixon, J-M. Seignuer, S. Terzis, W. Wagealla, C. Yong: “SECURE Deliverable 5.1: Application Scenarios”, September 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
English, C., Wagealla, W., Nixon, P., Terzis, S., Lowe, H., McGettrick, A. (2003). Trusting Collaboration in Global Computing Systems. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_10
Download citation
DOI: https://doi.org/10.1007/3-540-44875-6_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40224-4
Online ISBN: 978-3-540-44875-4
eBook Packages: Springer Book Archive