scispace - formally typeset
Open AccessBook ChapterDOI

Why Isn't Trust Transitive?

TLDR
The notion of trust is distinguished from a number of other (transitive) notions with which it is frequently confused, and it is argued that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.
Abstract
One of the great strengths of public-key cryptography is its potential to allow the localization of trust. This potential is greatest when cryptography is present to guarantee data integrity rather than secrecy, and where there is no natural hierarchy of trust. Both these conditions are typically fulfilled in the commercial world, where CSCW requires sharing of data and resources across organizational boundaries. One property which trust is frequently assumed or “proved” to have is transitivity (if A trusts B and B trusts C then A trusts C) or some generalization of transitivity such as *-closure. We use the loose term unintensional transitivity of trust to refer to a situation where B can effectively put things into A's set of trust assumptions without A's explicit consent (or sometimes even awareness.) Any account of trust which allows such situations to arise clearly poses major obstacles to the effective confinement (localization) of trust. In this position paper, we argue against the need to accept unintensional transitivity of trust. We distinguish the notion of trust from a number of other (transitive) notions with which it is frequently confused, and argue that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.

read more

Content maybe subject to copyright    Report






Citations
More filters
Dissertation

Colocation aware content sharing in urban transport

Liam McNamara
TL;DR: A peer-to-peer content distribution system for wireless devices is proposed, grounded on three main contributions: a technique to predict colocation durations, a mechanism to exclude poorly performing peers and a library advertisement protocol.

AllNet: using Social Connections to Inform Traffic Prioritization and Resource Allocation

TL;DR: AllNet is a new networking protocol designed to provide communication utilizing all available means, including Internet and cellular communications, but when these are not available, also ad-hoc networking and delay-tolerant networking, which are best for low-bandwidth communications.
Book ChapterDOI

A Framework for Trust-Based Multidisciplinary Team Recommendation

TL;DR: This work proposes a model for assessing the reputation of participants in collaborative teams that takes into account several features such as the different skills that a participant has and the feedback of team participants on her/his previous works.
Journal ArticleDOI

Extending Trust Transitivity in Databases

TL;DR: The paper proposes a model showing how trust can be transferred from a previous trust context to a new trust context, and indicates that Marsh's model is particularly inappropriate for use in social networks because it is highly theoretical and difficult to implement.

Predictors of Interpersonal Trust in Virtual Distributed Teams

Younho Seong
TL;DR: In this paper, the authors attempted to review the available literature with regards to the human interpersonal trust characteristics to identify important traits or factors when temporary mission oriented teams must be assembled, based on the review of the theories, a theory of human trust, trust continuum/grid/cube, was developed and discussed.
References
More filters
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book

Firewalls and Internet Security: Repelling the Wily Hacker

TL;DR: The first edition made a number of predictions, explicitly or implicitly, about the growth of the Web and the patterns of Internet connectivity vastly increased, and warned of issues posed by home LANs, and about the problems caused by roaming laptops.
Proceedings ArticleDOI

Reasoning about belief in cryptographic protocols

TL;DR: A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols and places a strong emphasis on the separation between the content and the meaning of messages.
Book

Logics and languages

Book

Firewalls and Internet Security

TL;DR: The 2-amino-3-bromoanthraquinone which is isolated may be used for the manufacture of dyes and is at least as pure as that obtained from purified 2- aminoanthraquin one by the process of the prior art.