Abstract
This paper investigates foundations for the description of, and reasoning about, trust in secure digital communication. We propose a logic, called the Typed Modal Logic (TML), which extends first-order logic with typed variables and modal operators to express agent beliefs. Based on the logic, the theory of trust for a specific security system can be established. Such trust theories provide a foundation for reasoning about trust in digital communication.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18–36, 1990.
A. Dekker. C3PO: A tool for automatic sound cryptographic protocol analysis. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, pages 77–87, Cambridge, UK, 3–5 July 2000. IEEE Computer Society.
E. Gerck. Overview of Certificate Systems: X.509, CA, PGP and SKIP. Available from http://mcg.org.br/.
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Society Symposium on Research in Security and Privacy, pages 234–248, Los Alamitos, California, 1990. IEEE Computer Society Press.
A. Jøsang, I. G. Pedersen, and D. Povey. PKI seeks a trusting relationship. In Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP 2000), volume 1841 of Lecture Notes in Computer Science, pages 191–205. Springer, 2000.
S. Kripke. Semantical considerations of modal logic. Acta Philosophica Fennica, 16:83–94, 1963.
C. Liu, M. A. Ozols, and T. Cant. An axiomatic basis for reasoning about trust in PKIs. In Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP 2001), volume 2119 of Lecture Notes in Computer Science, pages 274–291. Springer, 2001.
L. C. Paulson. ML for Working Programmer. Cambridge University Press, 1991.
P. V. Rangan. An axiomatic basis of trust in distributed systems. In Proceedings of the 1988 IEEE Computer Society Symposium on Research in Security and Privacy, pages 204–211, 1988.
P. F. Syverson and P. C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the IEEE Society Symposium on Research in Security and Privacy, pages 234–248, Oakland, CA USA, 1994. IEEE Computer Society Press.
R. Yahalom, B. Klein, and Th. Beth. Trust relationships in security systems — A distributed authentication prespective. In Proceedings of the 1993 IEEE Computer Society Symposium on research in Security and Privacy, pages 151–164, 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, C. (2001). Logical Foundations for Reasoning about Trust in Secure Digital Communication. In: Stumptner, M., Corbett, D., Brooks, M. (eds) AI 2001: Advances in Artificial Intelligence. AI 2001. Lecture Notes in Computer Science(), vol 2256. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45656-2_29
Download citation
DOI: https://doi.org/10.1007/3-540-45656-2_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42960-9
Online ISBN: 978-3-540-45656-8
eBook Packages: Springer Book Archive