scispace - formally typeset
Open AccessBook ChapterDOI

Why Isn't Trust Transitive?

TLDR
The notion of trust is distinguished from a number of other (transitive) notions with which it is frequently confused, and it is argued that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.
Abstract
One of the great strengths of public-key cryptography is its potential to allow the localization of trust. This potential is greatest when cryptography is present to guarantee data integrity rather than secrecy, and where there is no natural hierarchy of trust. Both these conditions are typically fulfilled in the commercial world, where CSCW requires sharing of data and resources across organizational boundaries. One property which trust is frequently assumed or “proved” to have is transitivity (if A trusts B and B trusts C then A trusts C) or some generalization of transitivity such as *-closure. We use the loose term unintensional transitivity of trust to refer to a situation where B can effectively put things into A's set of trust assumptions without A's explicit consent (or sometimes even awareness.) Any account of trust which allows such situations to arise clearly poses major obstacles to the effective confinement (localization) of trust. In this position paper, we argue against the need to accept unintensional transitivity of trust. We distinguish the notion of trust from a number of other (transitive) notions with which it is frequently confused, and argue that “proofs” of the unintensional transitivity of trust typically involve unpalatable logical assumptions as well as undesirable consequences.

read more

Content maybe subject to copyright    Report






Citations
More filters
Proceedings ArticleDOI

Supporting trust in virtual communities

TL;DR: In this article, a trust model that is grounded in real-world social trust characteristics, and based on a reputation mechanism, or word-of-mouth, is proposed for the virtual medium.
Journal ArticleDOI

A survey of trust in internet applications

TL;DR: This survey examines the various definitions of trust in the literature and provides a working definition of trust for Internet applications and some influential examples of trust management systems.
Journal ArticleDOI

Secure routing for mobile ad hoc networks

TL;DR: The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.
Journal ArticleDOI

A survey of trust in social networks

TL;DR: This article presents the first comprehensive review of social and computer science literature on trust in social networks and discusses recent works addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination.
Proceedings Article

The ghost in the browser analysis of web-based malware

TL;DR: This work identifies the four prevalent mechanisms used to inject malicious content on popular web sites: web server security, user contributed content, advertising and third-party widgets, and presents examples of abuse found on the Internet.
References
More filters