skip to main content
10.1145/1542207.1542242acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Towards a dynamic and composable model of trust

Authors Info & Claims
Published:03 June 2009Publication History

ABSTRACT

During their everyday decision making, humans consider the interplay between two types of trust: vertical trust and horizontal trust. Vertical trust captures the trust relationships that exist between individuals and institutions, while horizontal trust represents the trust that can be inferred from the observations and opinions of others. Although researchers are actively exploring both vertical and horizontal trust within the context of distributed computing (e.g., credential-based trust and reputation-based trust, respectively), the specification and enforcement of composite trust management policies involving the flexible composition of both types of trust metrics is currently an unexplored area.

In this paper, we take the first steps towards developing a comprehensive approach to composite trust management for distributed systems. In particular, we conduct a use case analysis to uncover the functional requirements that must be met by composite trust management policy languages. We then present the design and semantics of CTM: a flexible policy language that allows arbitrary composition of horizontal and vertical trust metrics. After showing that CTM embodies each of the requirements discovered during our use case analysis, we demonstrate that CTM can be used to specify a wide range of interesting composite trust management policies, and comment on several systems challenges that arise during the composite trust management process.

References

  1. Amazon.com: Recommended for you. Web Site, Dec. 2008. http://www.amazon.com/gp/yourstore/recs/.Google ScholarGoogle Scholar
  2. S. Axelsson. Intrusion detection systems: A survey and taxonomy. Dept. of Computer Engineering Technical Report 99-15, Chalmers University of Technology, Mar. 2000.Google ScholarGoogle Scholar
  3. L. Bauer, S. Garriss, and M. K. Reiter. Distributed proving in access-control systems. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 81--95, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Y. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 159--168, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827--842, July 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. K. Bhargava and Y. Zhong. Authorization based on evidence and trust. In International Conference on Data Warehousing and Knowledge Discovery, pages 94--103, Aix-en-Provence, France, Sept. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Biskup and Y. Karabulut. A hybrid pki model: Application to secure mediation. In DBSec, pages 271--282, 2002.Google ScholarGoogle Scholar
  8. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the Second International Conference on Financial Cryptography, number 1465 in Lecture Notes in Computer Science, pages 254--274. Springer, Feb. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri. An integration of reputation-based and policy-based trust management. In Sematic Web and Policy Workshop, Galway, Ireland, Nov. 2005.Google ScholarGoogle Scholar
  11. B. Carminati, E. Ferrari, and A. Perego. Enforcing access control in web-based social networks. ACM Transactions in Information and System Security. to appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Carminati, E. Ferrari, and A. Perego. Combining social networks and semantic web technologies for personalizing web access. In Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Nov. 2008.Google ScholarGoogle Scholar
  13. B. Carminati, E. Ferrari, and A. Perego. A decentralized security framework for web-based social networks. International Journal of Information Security and Privacy, 2(4):22--53, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In Proceedings of the 11th international conference on World Wide Web, pages 376--386, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207--216, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers, 55(10):1259--1270, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Grimsley, A. Meehan, G. Green, and B. Stafford. Social capital, community trust, and e-government services. In International Conference on Trust Management, Pisa, Italy, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys, to appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the IEEE Symposium on Security and Privacy, pages 106--115, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43(2):618--644, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Kamvar, M. Schlosser, and H. Garcia-Molina. EigenRep: Reputation Management in P2P Networks. In Twelfth International World Wide Web Conference, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H.-C. Choi. D-foaf: Distributed identity management with access rights delegation. In Asian Semantic Web Conference, Beijing, China, Sept. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. J. Lee and M. Winslett. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. In Proceedings of the 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 228--239, Mar. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Li and J. C. Mitchell. RT: A role-based trust-management framework. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), pages 201--212, Apr. 2003.Google ScholarGoogle Scholar
  25. N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM, 52(3):474--514, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35--86, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  27. Liberty alliance project. Web Site, Dec. 2008. http://www.projectliberty.org/.Google ScholarGoogle Scholar
  28. A. Mounji, B. L. Charlier, D. Zampunieris, and N. Habra. Distributed audit trail analysis. In Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95), 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. NetFlix prize: Home. Web Site, Dec. 2008. http://www.netflixprize.com/.Google ScholarGoogle Scholar
  30. R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Shibboleth Project. http://shibboleth.internet2.edu/.Google ScholarGoogle Scholar
  33. TrustBuilder2 download page. Web site, Oct. 2008. http://dais.cs.uiuc.edu/dais/security/tb2/.Google ScholarGoogle Scholar
  34. L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the Second ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), pages 45--55, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. D. Wijesekera and S. Jajodia. A propositional policy algebra for access control. ACM Transactions on Information and Systems Security (TISSEC), 6(2):286--325, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Jan. 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. L. Xiong and L. Liu. A reputation based trust model for peer-to-peer ecommerce communities. In IEEE International Conference on E-Commerce (CEC), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards a dynamic and composable model of trust

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologies
              June 2009
              258 pages
              ISBN:9781605585376
              DOI:10.1145/1542207

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 June 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SACMAT '09 Paper Acceptance Rate24of75submissions,32%Overall Acceptance Rate177of597submissions,30%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader