Abstract
The purpose of this paper is to show how to use Caution, a tool for the specification and evaluation of credential networks. The resulting degrees of support and possibility allow to make decisions concerning the authenticity and/or trustworthiness of an unknown entity in an open network. The specification of a credential network and the subsequent computations will be illustrated by examples.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jonczy, J., Haenni, R.: Credential networks: a general model for distributed trust and authenticity management. In: Ghorbani, A., Marsh, S. (eds.) PST 2005: 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, Canada, pp. 101–112 (2005)
Haenni, R., Jonczy, J., Kohlas, R.: Two-layer models for managing authenticity and trust. In: Song, R., Korba, L., Yee, G. (eds.) Trust in E-Services: Technologies, Practices and Challenges (accepted, 2006)
Jonczy, J., Haenni, R.: Implementing credential networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 164–178. Springer, Heidelberg (accepted, 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jonczy, J. (2006). Evaluating Trust and Authenticity with Caution . In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_34
Download citation
DOI: https://doi.org/10.1007/11755593_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34295-3
Online ISBN: 978-3-540-34297-7
eBook Packages: Computer ScienceComputer Science (R0)