scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A survey of trust in internet applications

01 Oct 2000-IEEE Communications Surveys and Tutorials (IEEE)-Vol. 3, Iss: 4, pp 2-16
TL;DR: This survey examines the various definitions of trust in the literature and provides a working definition of trust for Internet applications and some influential examples of trust management systems.
Abstract: Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy, i.e., who is authorized to perform actions as well as the techniques needed to manage and implement security to and for the applications. This survey examines the various definitions of trust in the literature and provides a working definition of trust for Internet applications. The properties of trust relationships are explained and classes of different types of trust identified in the literature are discussed with examples. Some influential examples of trust management systems are described.

Summary (6 min read)

1 MOTIVATION

  • Internet services are increasingly being used in daily life for electronic commerce, web-based access to information and inter-personal interactions via electronic mail rather than voice or faceto-face, but there is still major concern about the trustworthiness of these services.
  • There are no accepted techniques or tools for specification and reasoning about the trust.
  • There is a need for a high-level, abstract way of specifying and managing trust, which can be easily integrated into applications and used on any platform.
  • Customers must trust that sellers will provide the services they advertise, and will not disclose private customer information (name, address, credit card details, purchases etc.).
  • The level of trust has an approximate inverse relationship to the degree of risk with respect to a service or an e-commerce transaction [21] [22] [23] , but there has been very little work on using risk management frameworks for trust management or on the analysis of the exact relationship between risk and trust.

2 DEFINING TRUST

  • There is no consensus in the literature on what trust is and on what constitutes trust management [21, 23] , though many research scientists recognise its importance [24, 25] .
  • Competence is a better term than strength for the environment related to services and computing system, i.e. an entity should be capable of performing the functions expected of it or the service it is meant to provide correctly and within reasonable timescales.
  • If I develop a trust relationship with a particular student, I may authorise him to install software on my computer and hence set up the necessary access control rights to permit access.
  • Anonymous authorisation can be implemented using capabilities or certificates [28] .
  • The authors define trust as "the firm belief in the competence of an entity to act dependably, securely and reliably within a specified context" (assuming dependability covers reliability and timeliness).

3 PROPERTIES OF TRUST RELATIONSHIPS

  • A person is only trusted to deal with financial transactions less than $2000 in value.
  • Examples include protecting files from accidental deletion or mechanisms to prevent a person driving a car when under the influence of alcohol.
  • There have been suggestions that trust relationships should not be transitive [23] , however, some trust scenarios do exhibit transitivity.
  • Some systems support arithmetic operations on trust recommendations so numeric quantification is more appropriate.
  • Jøsang's Opinion Model, based on subjective logic, may be a suitable technique for assigning trust values in the face of uncertainty [31] [32] [33] [34] .

4.1 Access to a Trustor's Resources

  • Abrams and Joyce [35] highlight the fact that resource access trust has been the focus for security specialists for many decades, although the emphasis has mostly been on mechanisms supporting access control.
  • Simple file access requires that the trustee will follow the correct protocol, will not divulge information read, and will write only correct data etc.
  • The code is expected not to damage the trustor's resources, to terminate within reasonable finite time and not to exceed some defined resource limits with respect to memory, processor time, local file space etc.
  • In [35, 36] , the authors implicitly map trust decisions to access control decisions.
  • Generally, resource access trust can form the basis for specifying authorisation policy, which then is implemented using operating system or database access control mechanisms, firewall rules etc.

Examples of Resource Access Trust

  • Third year and above students are trusted to use the parallel processing service.
  • These rather abstract specifications of trust and distrust would need to be refined into specific authorisations policies that define permitted operations to specific resources.

4.2 Provision of Service by the Trustee

  • The trustor trusts the trustee to provide a service that does not involve access to the trustor's resources.
  • Note this may not be true of many services such as web services that download applets and cookies, and so do require access to resources owned by the trustor.
  • Service bureaux and application service providers (ASPs) [38] [39] [40] are prime examples of entities that would require service provision trust to be established.
  • Mobile code and mobile agent based applications obviously must trust the execution environment provided by the remote system (provision of service trust) but the execution environment should not be damaged by the mobile code (access to resources trust).

Examples of Service Provision Trust

  • I trust a film recommendation service to only recommend films that are not pornographic.
  • A trustor's trust in the competence of the trustee's ability to provide a service differs from confidence trust in that, confidence applies to entities the trustor will use and competence applies to entities that perform some action on behalf of the trustor.
  • The vendor or bank is also trusted to maintain the privacy of any information such as name, address and credit card details, which it holds about the customer.
  • I trust the newsagent to email me an electronic newspaper every morning before 8am.

4.3 Certification of Trustees

  • This may imply competence if the identity is a well-known organisation.
  • Professional certification is a common technique used to indicate competence in the medical world, commerce and engineering so could be applied to Internet services [23] .

Trustee Certification Examples

  • I will only use downloaded software updates, which have Microsoft certificates.
  • Note that the certification authority is in fact providing a trust certification service so this is a special form of service provision trust but involves a third party in establishing the trust.
  • There are many papers discussing this specific form of trust service, which is the reason the authors define it as a separate classification.

4.4 Delegation

  • Ding and Peterson [52] illustrate a novel way of implementing delegation, with hierarchical delegation tokens.
  • They propose a classification of delegation schemes, with appropriate protocols, which they analyse, based on efficiency, and compare with related work.
  • The ideas they express represent lower-level mappings from their concept of delegation in that they concentrate on access control.

4.5 Infrastructure Trust

  • He should be able to trust his workstation, local network and local servers, which may implement security or other services in order to protect his infrastructure.
  • The culmination of this work was the U.S. Department of Defense specification for a set of resources, known as the Trusted Computing Base (TCB) [53] that had to be trusted by all applications executing on a machine to support the required security policy.
  • The TCB can be viewed as the set of hardware, firmware and software elements, which are used to implement the reference validation mechanism i.e. the "validation of each reference to data or programs by any user (or program) against a list of authorized types of reference for that user".
  • It was aimed more at centralised systems implementing information labelling and preventing information flow to unauthorised users, rather than commercial or networked systems.

Infrastructure Trust Examples

  • I trust hardware that has been certified by the Trusted PC Computer Base Certification Board. .
  • The PC's application software trusts the operating system.

5 TRUST MANAGEMENT

  • Current solutions do not address this problem of trust changing with time.
  • Additionally, these systems unconditionally accept credentials offered by the trustee and then decide what the is permitted to do.
  • Even though there may be a relationship between the trustor and trustee, the trustee may wish to function in some other capacity than previously agreed upon.
  • Systems change and evolve so there is a need to monitor trust relationships to determine whether the criteria on which they are based still apply.

6.1 Public Key Certificates

  • The certification authority does not vouch for the trustworthiness of the key owner, but simply authenticates the owner's identity.
  • This is necessary to establish a resource access or service provision trust relationship and may implicitly reduce the trustor's risk in dealing with the trustee [23] .
  • The PGP trust model [47] is used for authentication relating to electronic mail type of applications between human users.
  • An introducer is an entity that signs someone else's public key (and thus vouches for a name-public key binding).
  • Each entity must have a certificate that is signed by the central certification authority or another authority, which has been directly or indirectly certified by it.

6.2 Platform for Content Selection (PICS)

  • PICS was developed by the World Wide Web Consortium (W3C) as a solution to the problem of protecting children from pornography on the Internet without infringing on one's right to freedom of speech.
  • A PICS-compliant application should be able to read PICS labels and use the user-defined filtering rules to decide whether to accept or reject the document.
  • The URL in the rating-service clause identifies the document with the human-readable description of the rating service.
  • In the above example, the name clause defines a human readable name for the rule and a description.
  • The other clauses reject pages from two sites, accept good plays, allow educational documents, reject documents with too much violence (unless they are educational), block any page with too many graphics (with the exceptional of educational documents) and allow all other pages.

6.3 AT& T PolicyMaker and KeyNote

  • Traditional certificate frameworks such as PGP and X.509 do not bind access rights to the owner of the public key within the certificate framework.
  • The inputs to the PolicyMaker interpreter are the local policy, the received credentials and an action string (which specifies the actions that the public key wants to perform).
  • A credential is a signed trust assertion made by other entities and the signatures must be verified before the credentials can be used.
  • Filter programs take as input, the current action string and the environment, which contains information about the current context (e.g. date, time, application name, etc.).
  • The name of the language is given in assertions and must be known by anyone who needs to use the assertion.

policy

  • ASSERTS doctor_key WHERE filter that allows check-up if the field is not plastic surgery For Policymaker to make a decision there must be at least one policy in the input supplied to it from the trust base.
  • The following credential states that the BMA asserts that the person with key "0x12345abcd" is not a plastic surgeon.
  • It is important to note that assertions can modify the action strings that they accept, through the use of Annotations.
  • Annotations are essentially a mechanism for communication between assertions (inter-assertion communication), as well as communication between the application and the credentials.
  • This allows PolicyMaker to append conditions to the action strings, if necessary.

key1, key2, key3, ……… REQUESTS ActionString

  • Action strings are generated and interpreted by the calling applications.
  • In summary, an application gives the PolicyMaker engine, a (set of) requested action(s), a set of credentials and a policy and the engine tries to prove that the credentials contain a proof that the requested action(s) complies with the policy.
  • A simple, lightweight assertion language with no loops or recursion is used in order to enforce resource usage restrictions, to allow the assertions to be easily understood by humans and easily refined from high-level languages, etc. [56] .
  • The current implementation of the KeyNote Toolkit is written in C. Neither system addresses the problem of how to discover that credentials are missing, and neither system supports negative assertions.
  • The authors claimed that both these systems are a more general solution to the trust management problem than public-key certificates.

6.4 Rule-controlled Environment For Evaluation of Rules and Everything Else (REFEREE)

  • REFEREE is a trust management system for making access decisions relating to Web documents developed by Yang-Hua Chu based on PolicyMaker [41, 42] .
  • All statements are "two element s-expressions", similar to attribute value pairs.
  • REFEREE runs the module's interpreter with the policy and list of arguments, which may result in other modules being invoked, then returns an answer to the host application.
  • The following policies highlight some features of this language.

STATEMENT-LIST )

  • This policy states that labels from the MIT and CMU bureaus should be used and only pages with labels that state that the document has been thoroughly checked for viruses can be downloaded.
  • For this example, the invoke clause runs the load label module, which loads the labels from the bureaus.
  • The match clause searches all the labels for the pattern described.

6.5 IBM Trust Establishment Framework

  • IBM views trust establishment as the enabling component of E-Commerce [62] .
  • Their system is similar to PolicyMaker, but permits negative rules preventing access.
  • The Trust Establishment module validates the client's certificate and then maps the certificate owner to a role.
  • The following example is taken from [63] .

</POLICY>

  • The first group defined is the originating retailer.
  • Then, it is stated that entities that have partner certificates, signed by the original retailer, are placed in the group partners.
  • The group department is defined as any user having a partner certificate signed by the partners group.
  • Finally, the customer group consists of anyone that has an employee certificate signed by a member of the departments group who has a rank greater than 3.
  • After the Trust Establishment module has determined that an entity can be assigned to a particular role, it then sends this information to another module, which stipulates the access rights that are bound to the particular role.

6.6 Logic-Based Formalisms of Trust

  • Trust involves specifying and reasoning about beliefs.
  • The Authorization Specification Language (ASL) by Jajodi, Samarati and Subrahmanian [66] is used to specify authorization rules and makes explicit the need for the separation of policies and mechanisms.
  • They adopt the relevant axiomatic schemas into their formalism and use their composite language to model various trust scenarios.
  • His model consists of simple trust statements (for example B i p, which means "agent i believes proposition p") and properties such as transitivity, Euclidean property, etc. are defined.

7 APPLICATIONS OF TRUST MANAGEMENT

  • Most of the literature relating to trust applications really discusses security requirements relating to authentication, confidentially, data-integrity or non-repudiation rather than trust as the authors defined it.
  • The authors have selected a few application domains that highlight some specific trust management requirements.

7.1 Medical Information Systems

  • Medicine has many sub-disciplines each with its own set of trust issues but based on a sound ethical foundation.
  • There are three major problems with emerging medical systems, namely: electronic trust relationships not matching the relationship in the real world, a focus on centralisation and putting too much power in the hands of one body, and the lack of sufficient mechanisms to de-identify records.
  • The responsible clinician must notify the patient of the names on his record's access control list when it is opened, of all subsequent additions, and whenever responsibility is transferred, also known as Consent and notification.
  • Issues arose as to what would happen when the certificate became obsolete.
  • Given these questions, a decision was made to use the catalogue hashes as the primary trust mechanism.

7.2 Information Retrieval Systems

  • From sections 6.2 and 6.4, the authors can see that attempts have been made to perform trust management in this domain.
  • To specify one's viewing tastes one can use any PICS-compliant filtering language, such as PICSRules or profiles-0.92.
  • It is also necessary to ensure that information retrieval systems do not disseminate information that is not for general distribution.
  • The emphasis in this work is on the prevention of information leakage from one level to another.

7.3 Mobile code

  • Mobile agents migrate code and data from one machine to another to perform tasks on behalf of a user.
  • Swarup and Schmidt [17] also briefly discuss this issue, highlighting the trust management mechanisms, policy negotiation protocols and mobility protocols.
  • Research in this field [5, 6, 89] is focused on formulating the best protocol to ensure that the mobile agent does not cause the server any harm.
  • These protocols define the process of trust establishment, but the other components of trust are totally ignored.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

1
IEEE Communications Surveys and Tutorials, Fourth Quarter 2000, http://www.comsoc.org/pubs/surveys/
A Survey of Trust in Internet Applications
Tyrone Grandison, Morris Sloman
Imperial College, Department of Computing
180 Queen’s Gate, London SW7 2BZ, UK
{tgrand, m.sloman}@ doc.ic.ac.uk
24 January 2001
Abstract
Trust is an important aspect of decision making for Internet applications and
particularly influences the specification of security policy i.e. who is authorised to
perform actions as well as the techniques needed to manage and implement security
to and for the applications. This survey examines the various definitions of trust in the
literature and provides a working definition of trust for Internet applications. The
properties of trust relationships are explained and classes of different types of trust
identified in the literature are discussed with examples. Some influential examples of
trust management systems are described.
Keywords:
Trust specification, trust management, security policy, authorisation, authentication
1 M
OTIVATION
Internet services are increasingly being used in daily life for electronic commerce, web-based
access to information and inter-personal interactions via electronic mail rather than voice or face-
to-face, but there is still major concern about the trustworthiness of these services. There are no
accepted techniques or tools for specification and reasoning about the trust. There is a need for a
high-level, abstract way of specifying and managing trust, which can be easily integrated into
applications and used on any platform. Typical applications requiring a formal trust specification
include content selection for web documents [1], medical systems [2], telecommuting [3], mobile
code and mobile computing [4-6], as well as electronic commerce [7-14]. Our main motivation
in studying trust specification and management is to use this as the starting point for subsequent
refinement into security policies related to authorisation and management of security [15].
However, there are additional reasons as to why trust is an important concept for modern
systems.
The migration from centralised information systems to internet-based applications will mean that
transactions have to span a range of domains and organisations [16], not all of which may be
trusted to the same extent. Inconsistencies in current trust relationships highlight the need for a
flexible, general-purpose trust management system that can navigate these (possibly) complex

2
trust domains. A domain may need to support a range of different trust relationships and hence
be capable of supporting different types of security policy [17].
Trust decisions are currently hard-coded into an application, which adds to the complexity of the
application and the inability to adapt to changes in trust and lack of flexibility when setting up
new relationships. A separation of the application’s purpose and its trust management
framework will offer a more scalable and flexible solution for the distributed environment.
Trust is a vital component in every business transaction. Customers must trust that sellers will
provide the services they advertise, and will not disclose private customer information (name,
address, credit card details, purchases etc.). Trust in the supplier’s competence and honesty will
influence the customer’s decision as to which supplier to use. Sellers must trust that the buyer is
able to pay for goods or services, is authorised to make purchases on behalf of an organisation or
is not underage for accessing service or purchasing certain goods. Thus, for Internet commerce
to achieve the same levels of acceptance as traditional commerce, trust management has to be an
intrinsic part of e-commerce.
Trust is usually specified in terms of a relationship between a trustor, the subject that trusts a
target entity, which is known as the trustee i.e. the entity that is trusted. Trust forms the basis for
allowing a trustee to use or manipulate resources owned by a trustor or may influence a trustor’s
decision to use a service provided by a trustee. Thus, trust can form an important factor in
decision-making [18-20]. The level of trust has an approximate inverse relationship to the
degree of risk with respect to a service or an e-commerce transaction [21-23], but there has been
very little work on using risk management frameworks for trust management or on the analysis
of the exact relationship between risk and trust. In many current business relationships, trust is
based on a combination of judgement or opinion based on face-to-face meetings or
recommendations of colleagues, friends and business partners. However, there is a need for a
more formalised approach to trust establishment, evaluation and analysis to support Internet
services, which generally do not involve human interaction.
In this survey we focus on trust in the context of networked and distributed computing systems,
in which it is not just the remote system that needs to be trusted, but also interactions over
underlying services such as communication services. Our focus is on modelling trust, so that it
can be used in automated systems. Work on the creation of computer frameworks of the entire
social concept of trust, though pertinent, is not our emphasis.
There is considerable variation in the meaning of trust as used in the literature. In the following
section we review the various definitions and suggest a definition applicable to internet services
and then discuss trust properties and relationships in more detail in section 3. In section 4 we
classify the different types of trust we have identified in the literature. In section 5 we introduce
the concept of trust management and in section 6 we describe examples of trust management
solutions in more detail. We elaborate on some of the application areas for trust management in
section 7, followed by a summary of the key ideas and future research directions.
2 D
EFINING
T
RUST
Trust is a complex subject relating to belief in honesty, truthfulness, competence, reliability etc.
of the trusted person or service. There is no consensus in the literature on what trust is and on

3
what constitutes trust management [21, 23], though many research scientists recognise its
importance [24, 25]. The significance of incorporating trust in distributed systems is that trust is
an enabling technology. Its inclusion will enable Internet commerce and seamless, secure agent-
based applications. Despite the need to standardize trust and its related concepts, many
researchers simply use and assume a definition of trust in a very specific way relating to topics
such as authentication, or ability to pay for purchases. However, a few authors have tried to
view trust in a generic way.
Kini and Choobineh [26] in their considerations on the theoretical framework of trust, examine it
from the perspectives of personality theorists, sociologists, economists and social psychologists.
They state that trust, as defined in the Webster dictionary, is:
· An assumed reliance on some person or thing. A confident dependence on the character,
ability, strength or truth of someone or something.
·
A charge or duty imposed in faith or confidence or as a condition of a relationship.
·
To place confidence (in an entity).
They highlight the implications of these definitions and combine their results with the social
psychological perspective of trust to create their definition of trust in a system – “a belief that is
influenced by the individual’s opinion about certain critical system features” [26]. Their
discussion, though general in concept, concentrated on human trust in Electronic Commerce, but
did not address trust between the entities involved in an E-Commerce transaction.
The European Commission Joint Research Centre defines trust as “the property of a business
relationship, such that reliance can be placed on the business partners and the business
transactions developed with them” [27]. This view of trust is from a business management
perspective and offers an interesting analysis of what must be done to enable trust in E-
Commerce. They state that the issues of the identification and reliability of business partners,
the confidentiality of sensitive information, the integrity of valuable information, the prevention
of unauthorized copying and use of information, guaranteed quality of digital goods, availability
of critical information, the management of risks to critical information, and the dependability of
computer services and systems (specifically the availability, reliability and integrity of
infrastructure, the prevention of unauthorised use of infrastructure, guaranteed level of services
and the management of risks to critical infrastructure) are key to the emergence of E-Commerce
as a viable commercial activity.
The Oxford Reference Dictionary states that trust is “the firm belief in the reliability or truth or
strength of an entity”. A trustworthy entity will typically have a high reliability and so will not
fail during the course of an interaction, will perform a service or action within a reasonable
period of time, will tell the truth and be honest with respect to interactions and will not disclose
confidential information. Competence is a better term than strength for the environment related
to services and computing system, i.e. an entity should be capable of performing the functions
expected of it or the service it is meant to provide correctly and within reasonable timescales.
Thus, trust is really a composition of many different attributes – reliability, dependability,
honesty, truthfulness, security, competence, and timeliness, which may have to be considered
depending on the environment in which trust is being specified.

4
Trust is a vast topic that incorporates trust establishment, trust management and security
concerns. The lack of consensus with regards to trust, has led authors to use the terms trust,
authorisation and authentication interchangeably. The outcome of a trust decision is based on
many things such as the trustor’s propensity to trust, its beliefs and past experiences relating to
the trustee.
Authorisation can be seen as the outcome of the refinement of a more abstract trust relationship.
For example, if I develop a trust relationship with a particular student, I may authorise him to
install software on my computer and hence set up the necessary access control rights to permit
access. We define authorisation as a policy decision assigning access control rights for a subject
to perform specific actions on a specific target with defined constraints.
Authentication is the verification of an identity of an entity, which may be performed by means
of a password, a trusted authentication service or using certificates. There is then an issue of the
degree of trust in the entity, which issued the certificate. Note that authorisation may not be
necessarily specified in terms of an identity. Anonymous authorisation can be implemented
using capabilities or certificates [28].
We define trust as “the firm belief in the competence of an entity to act dependably, securely and
reliably within a specified context” (assuming dependability covers reliability and timeliness).
Distrust may be a useful concept to specify as a means of revoking previously agreed trust or for
environments when entities are trusted, by default, and it is necessary to identify some entities
which are not trusted. We define distrust as “the lack of firm belief in the competence of an
entity to act dependably, securely and reliably within a specified context”.
We now examine some of the properties of trust relationships in more detail.
3 P
ROPERTIES OF
T
RUST
R
ELATIONSHIPS
In general, a trust relationship is not absolute – A will never trust B to do any possible action it
may choose. A trustor trusts a trustee with respect to its ability to perform a specific action or
provide a specific service within a context. For example, a person is only trusted to deal with
financial transactions less than $2000 in value. Even trust in oneself is not usually absolute and
there is a need to protect resources you own from mistakes or accidents you may cause.
Examples include protecting files from accidental deletion or mechanisms to prevent a person
driving a car when under the influence of alcohol.
A trust relationship can be one-to-one between two entities, however it may not be symmetric.
A’s trust in B is not usually the same as B’s trust in A. It may be a one-to-many relationship in
that it can apply to a group of entities such as the set of students in a particular year. It can also
be many-to-many such as the mutual trust between members of a group or a committee, or
many-to-one such as several departments trusting a corporate head branch. In general, the
entities involved in a trust relationship will be distributed and may have no direct knowledge of
each other so there is a need for mechanisms to support establishment of trust relationships
between distributed entities.

5
There have been suggestions that trust relationships should not be transitive [23], however, some
trust scenarios do exhibit transitivity. The concept of trust delegation is a prime example of the
application of trust transitivity. When I delegate my trust decisions to another, for example John,
I authorize John to make trust decisions on my behalf. Thus, when I delegate to John and John
trusts an unknown entity (say Tim), John is essentially stating that I trust Tim. According to
Christianson and Harbison in [29] the concept of transitivity should be avoided, as it can result in
entity B adding trust assertions to an entity A’s trust base without A’s explicit consent leading to
unintentional transitivity. We agree that transitivity of trust may have unexpected and adverse
results if it implies updating the trust base of a trustor to include derived assertions, but it is may
be necessary in some situations. We consider transitivity to be inherent in some relationships
and so should be considered in the analysis of trust systems in order to determine which
undesired side effects should be prevented.
There is often a level of trust associated with a relationship [30]. Some entities may be trusted
more than others with respect to performing an action. It is not clear whether this level should be
discrete or continuous. If discrete values are used, then a qualitative label such as high, medium
or low may be sufficient. Some systems support arithmetic operations on trust recommendations
so numeric quantification is more appropriate. It is also possible to provide a mapping from
qualitative to numeric labels. However, there is still a problem relating to representation of
ignorance (or the unknown) with respect to trust.
Jøsang’s Opinion Model, based on subjective logic, may be a suitable technique for assigning
trust values in the face of uncertainty [31-34]. An opinion is a representation of a belief and is
modelled as a triplet, consisting of: b (a measure of one’s belief), d (a measure of one’s disbelief)
and i (a measure of ignorance); such that b + d + i = 1. It is assumed that b, d and i are
continuous and between 0 and 1 (inclusive). This model’s strength lies in the ability to reason
about the opinions (on a mathematically sound basis) and its consensus, recommendation and
ordering operators [31]. However, its major weakness is that it cannot be guaranteed that users
will accurately assign values appropriately.
From the literature it is clear that there are many different types of trust, which relate to the
specific purposes or nature of a trust relationship. In the following section we provide a
classification of the types of trust.
4 T
RUST
C
LASSIFICATION
We have identified different forms of trust in the literature relating to whether access is being
provided to the trustor’s resources, the trustee is providing a service, trust concerns
authentication or it is being delegated. This is not meant to be an exhaustive taxonomy, but
merely a useful way of classifying the literature relating to trust in internet services.
4.1 Access to a Trustor’s Resources
A trustor trusts a trustee to use resources that he owns or controls, which could be a software
execution environment or an application service [35-37]. Abrams and Joyce [35] highlight the
fact that resource access trust has been the focus for security specialists for many decades,
although the emphasis has mostly been on mechanisms supporting access control.

Citations
More filters
Journal ArticleDOI
01 Mar 2007
TL;DR: Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision as mentioned in this paper, where the basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score.
Abstract: Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score, which can assist other parties in deciding whether or not to transact with that party in the future. A natural side effect is that it also provides an incentive for good behaviour, and therefore tends to have a positive effect on market quality. Reputation systems can be called collaborative sanctioning systems to reflect their collaborative nature, and are related to collaborative filtering systems. Reputation systems are already being used in successful commercial online applications. There is also a rapidly growing literature around trust and reputation systems, but unfortunately this activity is not very coherent. The purpose of this article is to give an overview of existing and proposed systems that can be used to derive measures of trust and reputation for Internet transactions, to analyse the current trends and developments in this area, and to propose a research agenda for trust and reputation systems.

3,493 citations

Journal ArticleDOI
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.

1,001 citations


Cites background from "A survey of trust in internet appli..."

  • ...IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]....

    [...]

Journal ArticleDOI
TL;DR: This review wants to offer a panoramic view on current computational trust and reputation models in virtual societies.
Abstract: The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and performance of electronic communities. Computer science has moved from the paradigm of isolated machines to the paradigm of networks and distributed computing. Likewise, artificial intelligence is quickly moving from the paradigm of isolated and non-situated intelligence to the paradigm of situated, social and collective intelligence. The new paradigm of the so called intelligent or autonomous agents and multi-agent systems (MAS) together with the spectacular emergence of the information society technologies (specially reflected by the popularization of electronic commerce) are responsible for the increasing interest on trust and reputation mechanisms applied to electronic societies. This review wants to offer a panoramic view on current computational trust and reputation models.

982 citations


Cites background from "A survey of trust in internet appli..."

  • ...In the area of trust, Grandison et al. in their work “A survey of trust in Internet application” (Grandison and Sloman 2000) examine the various definitions of trust in the literature and provide a working definition of trust for Internet applications....

    [...]

Journal ArticleDOI
TL;DR: Fire, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent’s likely performance in open systems, is presented and is shown to help agents gain better utility than their benchmarks.
Abstract: Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system. This openness means existing trust and reputation models cannot readily be used since their performance suffers when there are various (unforseen) changes in the environment. To this end, this paper presents FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent's likely performance in open systems. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation to provide trust metrics in most circumstances. FIRE is empirically evaluated and is shown to help agents gain better utility (by effectively selecting appropriate interaction partners) than our benchmarks in a variety of agent populations. It is also shown that FIRE is able to effectively respond to changes that occur in an agent's environment.

800 citations


Cites background or methods from "A survey of trust in internet appli..."

  • ...[13] since the agent is trusted to access the system’s resources....

    [...]

  • ...In order to automate this process, several trust policy management systems have been developed (such as PolicyMaker [13], Trust-Serv [32], and KAoS [35])....

    [...]

  • ...Since traditional security mechanisms cannot protect an agent from unreliable service providers, novel models have been developed to model service provision trust—the trust that a service provider is competent and will provide a service in a reliable manner [13]....

    [...]

  • ...logging in), an authorised user is granted a clearly defined set of rights, which allows it to access a certain set of resources [13]....

    [...]

Journal ArticleDOI
TL;DR: This paper gives an overview of existing trust research in computer science and the Semantic Web.

755 citations


Cites background from "A survey of trust in internet appli..."

  • ...[6] T. Grandison, M. Sloman, A survey of trust in internet applications, IEEE Commun....

    [...]

  • ...2002, http://www.imakenews.com/smei/e article000051474.cfm. [67] S. Staab, B. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T.S. Dillon, E. Chang, F.K. Hussain, W. Nejdl, D. Olmedilla, V. Kashyap, The pudding of trust, IEEE Intell....

    [...]

  • ...The next definition, from Grandison and Sloman [6], introuces context and is unique in referring to the “competence” to ct (instead of actions, themselves): “[Trust is] the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context.”...

    [...]

  • ...The next definition, from Grandison and Sloman [6], introuces context and is unique in referring to the “competence” to ct (instead of actions, themselves):...

    [...]

  • ...Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O’Hara et al....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Abstract: Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.

2,638 citations


"A survey of trust in internet appli..." refers background or methods in this paper

  • ...Burrows, Abadi and Needham [65] propose a language to specify the steps followed in the authentication process between two entities (resource access protocol analysis)....

    [...]

  • ...Simple relational formalisms are used to model trust with statements of the form Ta b, which means “a trusts b” [64-67]....

    [...]

  • ...As stated in [65], “Since we operate at an abstract level, we do not consider errors introduced by concrete implementations of a protocol, such as deadlocks, or even inappropriate use of cryptosystems....

    [...]

Proceedings ArticleDOI
06 May 1996
TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
Abstract: We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.

2,247 citations


"A survey of trust in internet appli..." refers background or methods in this paper

  • ...Blaze et a1. defined trust management as "a unified approach fying and interpreting security policies, credentials, and rela­ tionships that allow direct authorization of security-critica l actions" [ 54 ]....

    [...]

  • ...PolicyMaker is a trust management application, developed at AT&T Research Laboratories, that specifies what a public key is authorized to do [ 54 ]....

    [...]

  • ...Each entity must have a cer­ tificate that is signed by the central certification authority or another authority, which has been directly or indirectly certi­ fied by it. This model assumes that certification authorities are organized into a universal "certification authority tree" and that all certificates within a local community will be signed by a certification authority that can be linked into this tree [ 54 ]....

    [...]

  • ...The paper by Blaze et a1. [ 54 ] was one of the first to introduce the term trust management, although prior security for networked applications had an implicit notion of trust management based on POP [47] or X.509 public-key certifi­ cates [46, 48], which are discussed in a later section....

    [...]

Journal ArticleDOI
TL;DR: A cross-cultural validation of an Internet consumer trust model is reported on, which examined both antecedents and consequences of consumer trust in a Web merchant and provides tentative support for the generalizability of the model.
Abstract: Many have speculated that trust plays a critical role in stimulating consumer purchases over the Internet. Most of the speculations have rallied around U.S. consumers purchasing from U.S.–based online merchants. The global nature of the Internet raises questions about the robustness of trust effects across cultures. Culture may also affect the antecedents of consumer trust; that is, consumers in different cultures might have differing expectations of what makes a web merchant trustworthy. Here we report on a cross-cultural validation of an Internet consumer trust model. The model examined both antecedents and consequences of consumer trust in a Web merchant. The results provide tentative support for the generalizability of the model.

1,684 citations


"A survey of trust in internet appli..." refers background in this paper

  • ...Typical applications requiring a formal trust specification include content selection for web documents [1], medical systems [2], telecommuting [3], mobile code and mobile computing [4-6], as well as electronic commerce [7-14]....

    [...]

Dissertation
01 Jan 1994
TL;DR: The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism and provides a step in the direction of a proper understanding and definition of human trust.
Abstract: Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you,” but what does that mean? This thesis provides a clarification of trust. We present a formalism for trust which provides us with a tool for precise discussion. The formalism is implementable: it can be embedded in an artificial agent, enabling the agent to make trust-based decisions. Its applicability in the domain of Distributed Artificial Intelligence (DAI) is raised. The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism. The formalism provides a step in the direction of a proper understanding and definition of human trust. A contribution of the thesis is its detailed exploration of the possibilities of future work in the area.

1,660 citations


"A survey of trust in internet appli..." refers methods in this paper

  • ...Simple relational formalisms are used to model trust with statements of the form Ta b, which means “a trusts b” [64-67]....

    [...]

Frequently Asked Questions (13)
Q1. What are the contributions mentioned in the paper "A survey of trust in internet applications" ?

Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i. e. who is authorised to perform actions as well as the techniques needed to manage and implement security to and for the applications. This survey examines the various definitions of trust in the literature and provides a working definition of trust for Internet applications. The properties of trust relationships are explained and classes of different types of trust identified in the literature are discussed with examples. 

The authors hope to extend this to allow the specification of more abstract and potentially complex trust relationships between entities and across organisational domains. The authors will use the policy refinement tools, being developed, to generate the Ponder policy specification. This can be translated into implementation mechanisms such as Windows security templates, firewall rules or Java security policy. The toolkit must support the concepts of trust quantification from third parties and delegation of trust decisions, which may be likely in automated trust systems. 

Service bureaux and application service providers (ASPs) [38-40] are prime examples of entities that would require service provision trust to be established. 

Due to PGP’s lack of official mechanisms for the creation, acquisition and distribution of certificates it is considered unreliable for E-Commerce, but appropriate for personal communication. 

It was hoped that leaving the assertion language an open issue would mean flexibility and greater programmability for PolicyMaker. 

A separation of the application’s purpose and its trust management framework will offer a more scalable and flexible solution for the distributed environment. 

The PolicyMaker system is essentially a query engine which can either be built into applications (through a linked library) or run as a “daemon” service. 

Forms of first order predicate logic [64- 67] or (modified) modal logic [68-71] have been used to represent trust and its associated concepts. 

They state that the issues of the identification and reliability of business partners, the confidentiality of sensitive information, the integrity of valuable information, the prevention of unauthorized copying and use of information, guaranteed quality of digital goods, availability of critical information, the management of risks to critical information, and the dependability of computer services and systems (specifically the availability, reliability and integrity of infrastructure, the prevention of unauthorised use of infrastructure, guaranteed level of services and the management of risks to critical infrastructure) are key to the emergence of E-Commerce as a viable commercial activity. 

Every key that a user trusts or signs has to have a degree of trust associated to it, namely: unknown, untrusted, marginally trusted or completely trusted. 

Jøsang’s Opinion Model, based on subjective logic, may be a suitable technique for assigning trust values in the face of uncertainty [31-34]. 

WAX is “a system for publishing electronic medical books containing information such as treatment protocols, drug formularies and government regulations to which healthcare professionals need frequent access in support of clinical decision-making” [84]. 

This type of trust maps into a form of access control, which is subject-based, in that the subject is only permitted to access trusted services.