skip to main content
10.1145/2600176.2600193acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

Evidence-based trust reasoning

Published:08 April 2014Publication History

ABSTRACT

Trust is a necessary component in cybersecurity. It is a common task for a system to make a decision about whether or not to trust the credential of an entity from another domain, issued by a third party. Generally, in the cyberspace, connected and interacting systems largely rely on each other with respect to security, privacy, and performance. In their interactions, one entity or system needs to trust others, and this "trust" frequently becomes a vulnerability of that system. Aiming at mitigating the vulnerability, we are developing a computational theory of trust, as a part of our efforts towards Science of Security. Previously, we developed a formal-semantics-based calculus of trust [3, 2], in which trust can be calculated based on a trustor's direct observation on the performance of the trustee, or based on a trust network. In this paper, we construct a framework for making trust reasoning based on the observed evidence. We take privacy in cloud computing as a driving application case [5].

References

  1. K. Blomqvist. The Many Faces of Trust. Scandinavian Journal of Management, 13(3):271--286, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Huang and D. Nicol. A Calculus of Trust and Its Application to PKI and Identity Management. In Proceedings of IDTrust'09. ACM, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Huang and D. Nicol. A formal-semantics-based calculus of trust. IEEE Internet Computing, 14(5):38--46, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Huang and D. M. Nicol. Trust mechanisms for cloud computing. Journal of Cloud Computing, 2(1), 2013.Google ScholarGoogle Scholar
  5. J. Huang and D. M. Nicol. Evidence-based trust on privacy protection in cloud computing, 2014. Research Report of ITI, UIUC.Google ScholarGoogle Scholar
  6. R. Mayer, J. Davis, and F. Schoorman. An Integrative Model of Organizational Trust: Past, Present, and Future. Academic of Management Review, 20(3):709--734, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Pearl. Causality: Models, Reasoning, and Inference, 2nd Ed. Cambridge University Press, New York, NY, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Solove. A taxonomy of privacy. University of Pennsylvania Law Review, 154(3):477--560, Jan. 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Evidence-based trust reasoning

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
            April 2014
            184 pages
            ISBN:9781450329071
            DOI:10.1145/2600176

            Copyright © 2014 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 April 2014

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            HotSoS '14 Paper Acceptance Rate12of21submissions,57%Overall Acceptance Rate34of60submissions,57%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader