Skip to main content

Statistical Trustability (Conceptual Work)

  • Conference paper
  • First Online:
Trust Management (iTrust 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2692))

Included in the following conference series:

Abstract

Trust management and trust-aware applications have gained importance in re- cent years (e.g., [1,2]). Conventional security mechanisms are unable to cover all application domains. For example, in ad hoc networks, the frequent lack of an online connection to the Internet makes routine tasks very difficult. Trust seems to be a good way to overcome such shortcomings because it does not necessarily rely on fixed centralized infrastructures [5].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system. In CIKM, pages 310–317, 2001.

    Google Scholar 

  2. T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proc. 3rd European Symposium on Research in Computer Security — ESORICS’ 94, pages 3–18, 1994.

    Google Scholar 

  3. S. Giordano. Mobile ad hoc networks. In Handbook of Wireless Networks and Mobile Computing. John Wiley & Sons, 2002.

    Google Scholar 

  4. Klaus Herrmann. MESHMdl — A Middleware for Self-Organization in Ad hoc Networks. In Proceedings of the 1st International Workshop on Mobile Distributed Computing (MDC’03), May 19 2003.

    Google Scholar 

  5. Pradip Lamsal. Understanding trust and security. http://www.cs.helsinki.fi/u/lamsal/asgn/trust/UnderstandingTrustAndSecurity.pdf, 2001.

  6. S. Marsh. Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.

    Google Scholar 

  7. S. Schulz, K. Herrmann, R. Kalcklösch, T. Schwotzer. Towards trust-based knowledge management in mobile communities. In AAAI Spring Symposium on Agent-Mediated Knowledge Management; Stanford University/USA, March 2003.

    Google Scholar 

  8. T. Schwotzer and K. Geihs. Shark-a system for management, synchronization and exchange of knowledge in mobile user groups. In Proceedings of the 2nd International Conference on Knowledge Management (I-KNOW’ 02), Graz, Austria, pages 149–156, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalcklösch, R., Herrmann, K. (2003). Statistical Trustability (Conceptual Work). In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-44875-6_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40224-4

  • Online ISBN: 978-3-540-44875-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics