Why Isn't Trust Transitive?
Bruce Christianson,William S. Harbison +1 more
- pp 171-176
Reads0
Chats0
TLDR
The notion of trust is distinguished from a number of other (transitive) notions with which it is frequently confused, and it is argued that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.Abstract:
One of the great strengths of public-key cryptography is its potential to allow the localization of trust. This potential is greatest when cryptography is present to guarantee data integrity rather than secrecy, and where there is no natural hierarchy of trust. Both these conditions are typically fulfilled in the commercial world, where CSCW requires sharing of data and resources across organizational boundaries. One property which trust is frequently assumed or “proved” to have is transitivity (if A trusts B and B trusts C then A trusts C) or some generalization of transitivity such as *-closure. We use the loose term unintensional transitivity of trust to refer to a situation where B can effectively put things into A's set of trust assumptions without A's explicit consent (or sometimes even awareness.) Any account of trust which allows such situations to arise clearly poses major obstacles to the effective confinement (localization) of trust. In this position paper, we argue against the need to accept unintensional transitivity of trust. We distinguish the notion of trust from a number of other (transitive) notions with which it is frequently confused, and argue that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.read more
Citations
More filters
Posted Content
Towards Attack-Tolerant Networks: Concurrent Multipath Routing and the Butterfly Network
Edward L. Platt,Daniel M. Romero +1 more
TL;DR: This work presents a novel concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm.
Dissertation
Adaptiveness and Social-Compliance in Trust Management - A Multi-Agent Based approach
TL;DR: In this article, the authors propose an infrastructure for gestion de the confiance adaptative and conforme socialement (ASC-TMS), which is based on a simulation multi-agent environment.
Managing the Internet of Things based on its Social Structure
TL;DR: A possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable is defined.
Journal ArticleDOI
Towards attack tolerant networks: Concurrent multipath routing and the butterfly network.
Edward L. Platt,Daniel M. Romero +1 more
TL;DR: In this paper, the authors present a concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm.
Adaptive Experience-Based Composition of Continuously Changing Quality of Context
TL;DR: The method bases on evidence theory and probability theory to compose a ground truth from disjoint information in a proposition and features a forgetting parameter facilitating adaption in case of, for example, maintenance to the providing agent.
References
More filters
Journal ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Book
Firewalls and Internet Security: Repelling the Wily Hacker
TL;DR: The first edition made a number of predictions, explicitly or implicitly, about the growth of the Web and the patterns of Internet connectivity vastly increased, and warned of issues posed by home LANs, and about the problems caused by roaming laptops.
Proceedings ArticleDOI
Reasoning about belief in cryptographic protocols
TL;DR: A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols and places a strong emphasis on the separation between the content and the meaning of messages.
Book
Firewalls and Internet Security
TL;DR: The 2-amino-3-bromoanthraquinone which is isolated may be used for the manufacture of dyes and is at least as pure as that obtained from purified 2- aminoanthraquin one by the process of the prior art.