Skip to main content

Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2557))

Abstract

The purpose of communication is the exchange of information among agents. Whether an agent believes a message passed by others to be reliable depends on trust which the agent would put in the system supporting secure communications required. Indeed, every security system depends on trust, in one form or another, among agents of the system. Different forms of trust exist to address different types of problems and mitigate risk in certain conditions. This paper discusses the concept of trust in general, and intends to investigate modelling methodologies for describing and reasoning about trust and agent beliefs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Antoniou and D. Billington. Relating defeasible and default logic. In AI2001: Advances in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 2256, pages 13–24. Springer-Verlag, 2001.

    Google Scholar 

  2. M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18–36, 1990.

    Article  Google Scholar 

  3. Arthur Delbridge and J. R. L. Bernard, editors. The Macquarie Concise Dictionary. The Macquarie Library, 1988.

    Google Scholar 

  4. Theo Dimitrakos. System models, e-risks and e-trust. towards bridging the gap? Available from http://www.bitd.clrc.ac.uk/PersonPublications/26853, 2001.

  5. N. M. Frank and L. Peters. Building trust: the importance of both task and social precursors. In Proceedings of the International Conference on Engineering and Technology Management: Pioneering New Technologies-Management Issues and Challenges in the Third Millennium, 1998.

    Google Scholar 

  6. E. Gerck. Overview of Certificate Systems: X.509, CA, PGP and SKIP. Available from http://mcg.org.br/.

  7. T. Grandison and M. Sloman. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, Fourth Quarter, 2000. Available from http://www.comsoc.org/pubs/surveys/.

  8. Andrew J. I. Jones. On the concept of trust. Decision Support Systems, 33:225–232, 2002.

    Article  Google Scholar 

  9. S. Jones. TRUST-EC: requirements for trust and confidence in E-commerce. European Commission, Joint Research Centre, 1999.

    Google Scholar 

  10. A. Jøsang. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security (NDSS’99) Symposium. The Internet Society, 1999.

    Google Scholar 

  11. A. Kini and J. Choobineh. Trust in electronic commerce: Definition and theoretical consideration. In Proceedings of the 31st International Conference on System Sciences, Hawaii, 1998.

    Google Scholar 

  12. C. Liu. Logical foundations for reasoning about trust in secure digital communication. In AI2001: Advances in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 2256, pages 333–344. Springer-Verlag, 2001.

    Google Scholar 

  13. C. Liu, M. A. Ozols, and T. Cant. An axiomatic basis for reasoning about trust in PKIs. In Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP 2001), volume 2119 of Lecture Notes in Computer Science, pages 274–291. Springer, 2001.

    Google Scholar 

  14. P. F. Syverson and P. C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the IEEE Society Symposium on Research in Security and Privacy, pages 234–248, Oakland, CA USA, 1994. IEEE Computer Society Press.

    Google Scholar 

  15. R. Yahalom, B. Klein, and Th. Beth. Trust relationships in security systems-A distributed authentication prespective. In Proceedings of the 1993 IEEE Computer Society Symposium on research in Security and Privacy, pages 151–164, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, C., Ozols, M.A. (2002). Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques. In: McKay, B., Slaney, J. (eds) AI 2002: Advances in Artificial Intelligence. AI 2002. Lecture Notes in Computer Science(), vol 2557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36187-1_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-36187-1_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00197-3

  • Online ISBN: 978-3-540-36187-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics