Abstract
Trust is an important aspect of the design and analysis of secure distributed systems. It is often used informally to designate those portions of a system that must function correctly in order to achieve the desired outcome. But it is a notoriously diffcult notion to formalize. What are the properties of trust? How is it learned, propagated, and utilized successfully? How can it be modeled? How can a trust model be used to derive protocols that are effcient and reliable when employed in today’s expansive networks? Past work has been concerned with only a few of these issues, without concentrating on the need for a comprehensive approach to trust modeling.
In this paper, we take a first step in that direction by studying an artificial community of agents that uses a notion of trust to succeed in a game against nature. The model is simple enough to analyze and simulate, but also rich enough to exhibit phenomena of real-life interactive communities. The model requires agents to make decisions. To do well, the agents are informed by knowledge gained from their own past experience as well as from the experience of other agents. Communication among agents allows knowledge to propagate faster through the network, which in turn can allow for a more successful community. We analyze the model from both a theoretical and an experimental point of view.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Birell A D, Lampson B W, Needham R M,et al. A Global Authentication Service Without Global Trust. Symposium on Security and Privacy, Oakland: IEEE, 1986. 222–230.
Gasser M, Goldstein A, Kaufman C,et al. The Digital Distributed System Security Architecture.Proc. 12th ACM NIST/NCSCNational Computer Security Conference. Oct. 1989. 305–319.
Kent S. Internet Privacy Enhanced Mail. Communications of the ACM, 1993,36(8):48–60.
Yahalom R, Klein B, Beth T. Trust Relationships in Secure Systems-Adistributed Authentication Perspective.Proc. IEEE Symposium on Research in Security and Provacy. 1993. 150–164.
Zimmerman P. The O6cial PGP User’s Guide. MIT-Press, 1995.
Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks.Proc. European Symposium on Research in Computer Security (ESORICS) 1994,Lecture Notes in Computer Science. Springer-Verlag, 1995, 3–18.
Maurer U. Modelling a Public-Key Infrastructure. E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editorsProc European Symposium on Research in Computer Security (ESORICS) 1996,Lecture Notes in Computer Science. New York: Springer-Verlag, 1997. 325–350.
Reiter M K, Stubblebine S G. Resilient Authentication Using Path Independence. IEEE Trans. Comput, 1998,47(12): 1351–1362.
Tarah A, Huitema C. Associating Metrics to Certification Paths.Proc European Symposium on Research in Computer Security (ESORICS) 1992,Lecture Notes in Computer Science. Springer-Verlag, 1993. 175–189.
Reiter M K, Stubblebine S G. Authentication Metric Analysis and Design.ACM Transactions on Information and System Security, 1999,2(2): 138–158.
Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management.Proc IEEE Symposium on Security and Privacy. 1996.
Burrows M, Abadi M, Needham R. A Logic of Authentication.ACM Transactions on Computer Systems. Feb. 1990.
Gong L, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols.Proc IEEESymposium on Security and Privacy. 1990. 234–248.
Rangan P V. An Axiomatic Theory of Trust in Secure Communication Protocols.Computers and Security Elsevier Science Publishers Ltd., Oxford, 1992. 163–172.
Blaze M, Feigenbaum J, Keromytis A. Keynote: Trust Management for Public-Key Infrastructures.Proc 1998Cambridge Security Protocols International Workshop, volume 1550of Lecture Notes in Computer Science. Springer, 1999. 59–63.
Chu Y H, Feigenbaum J, LaMacchia B,et al. REFEREE: Trust Management for Web Applications.World Wide Web Journal, 1997,2: 127–139.
Author information
Authors and Affiliations
Additional information
Biography: Zoë Diamadidi(1973-), female, Ph. D. candidate, research direction: distributed computing.
Rights and permissions
About this article
Cite this article
Diamadi, Z., Fischer, M.J. A simple game for the study of trust in distributed systems. Wuhan Univ. J. of Nat. Sci. 6, 72–82 (2001). https://doi.org/10.1007/BF03160228
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF03160228