scispace - formally typeset
Search or ask a question

Showing papers by "Zheng Yan published in 2006"


Book ChapterDOI
Zheng Yan1, Ronan Maclaverty1
03 Sep 2006
TL;DR: This paper develops a formal trust model to specify, evaluate and set up trust relationships that exist among system entities and presents an autonomic trust management architecture that adopts a number of algorithms for trust assessment and maintenance during component execution.
Abstract: Trust plays an important role in a software system, especially when, the system is component based and varied due to component joining and leaving. How to manage trust in such a system is crucial for embedded devices, such as mobile phones. This paper presents a trust management solution that can manage trust adaptively in a component based software (CBS) system. We develop a formal trust model to specify, evaluate and set up trust relationships that exist among system entities. We further present an autonomic trust management architecture that adopts a number of algorithms for trust assessment and maintenance during component execution. These algorithms use recent advances in Subjective Logic to ensure the management of trust within the CBS system.

22 citations


Book ChapterDOI
Silke Holtmanns1, Zheng Yan1
01 Jan 2006
TL;DR: From these social trust scenarios a context-aware adaptive trust concept is developed that takes into account the dynamics of trust and the context based grouping of trust properties.
Abstract: Trust is a very complex and multi-disciplined concept. In this article we start by analysing social trust scenarios to derive abstract trust concepts. From these abstract trust concepts a context-aware adaptive trust concept is developed. The context aware adaptive trust concept takes into account the dynamics of trust and the context based grouping of trust properties. The implementation of the concept will be subject to further evaluation and research.

17 citations


Proceedings ArticleDOI
Zheng Yan1
29 Jun 2006
TL;DR: A conceptual architecture towards establishing a trusted mobile environment is presented, explaining key motivations behind the location of every element in the architecture and evaluating the architecture by applying it into a mobile peer-to-peer system.
Abstract: Trust is crucial in mobile communications. How to establish a trusted mobile environment is becoming more and more important for mobile device venders, mobile service providers and mobile networking operators. This paper presents a conceptual architecture towards establishing a trusted mobile environment. The contribution of this paper is a) specifying the architecture of a trusted mobile environment; b) by developing the conceptual architecture, explaining key motivations behind the location of every element in the architecture; and c) evaluating the architecture by applying it into a mobile peer-to-peer system.

15 citations


Zheng Yan1, Peng Zhang1
16 Apr 2006
TL;DR: A trust management system in an enterprise's virtual private networks (VPN) that supports confidential content management and overcomes the diversity support of security in different devices manufactured by different vendors to enhance the trust in the mobile enterprise networking.
Abstract: Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise's virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in different devices manufactured by different vendors. Thus, it enhances the trust in the mobile enterprise networking. Our discussion is based on a self-regulating trusted computing mechanism. We illustrate how to apply this mechanism into mobile virtual private networks for a trusted mobile enterprise networking.

3 citations


Proceedings Article
Zheng Yan1
20 Nov 2006
TL;DR: The methodology for trust control mode prediction and selection in order to support autonomic platform trust management is presented and the simulation results show this method is effective for predicting and selecting the feasible trust control modes.
Abstract: Trust has been recognized as an important factor for a component software platform. Inside the platform, trust can be controlled according to its evaluation result. Special control modes can be applied into the software platform in order to ensure a trustworthy system. In this paper, we present a methodology for trust control mode prediction and selection in order to support autonomic platform trust management. The methodology is based on Fuzzy Cognitive Maps. The simulation results show this method is effective for predicting and selecting the feasible trust control modes.