Trust Transfer in Distributed Systems

  • Changyu Dong
  • Giovanni Russello
  • Naranker Dulay
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Trust transfer is a common technique employed in trust management systems to establish relationships between parties that are strangers. It is also well known that trust is not always transferable. That is, given an existing trust relationship, it may or may not be possible to derive new trust from it. In particular, it is not known under which constraints trust is transferable. In this paper we investigate trust transfer and identify when trust is transferable. Our analysis starts with a simple trust model. By using the model, we find that trust transfer is related to trust policy entailment. We then present a modal logic system which captures how trust and beliefs evolve in distributed systems. With the modal logic system we identify the key constraints on trust transfer regarding the communication between the trustor and the recommender and the trustor’s belief state


Modal Logic Trust Relationship Trust Management Trust Management System Indirect Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    M. Blaze, J. Feigenbaum, and J. Lacy (1996) Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 164, IEEE Computer Society.Google Scholar
  2. 2.
    A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, (Berkeley, CA), pp. 2–14.Google Scholar
  3. 3.
    N. Li, J. C. Mitchell, and W. H. Winsborough (2002) Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 114, IEEE Computer Society.Google Scholar
  4. 4.
    A. Jøsang, E. Gray, and M. Kinateder (2006) Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2):139–161.Google Scholar
  5. 5.
    A. Abdul-Rahman and S. Hailes (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, (New York, NY, USA), pp. 48–60, ACM Press.Google Scholar
  6. 6.
    B. Yu, M. P. Singh, and K. Sycara (2004) Developing trust in large-scale peer-to-peer systems. in: Proceedings of IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1–10.Google Scholar
  7. 7.
    C. M. Jonker and J. Treur (1999) Formal analysis of models for the dynamics of trust based on experiences. In F. J. Garijo and M. Boman (eds), vol. 1647 of Lecture Notes in Computer Science, pp. 221–231, Springer.Google Scholar
  8. 8.
    A. Birk (2000) Learning to trust. In: R. Falcone, M. P. Singh, and Y.-H. Tan (eds), vol. 2246 of Lecture Notes in Computer Science, pp. 133–144, Springer.Google Scholar
  9. 9.
    B. Christianson and W. S. Harbison (1997) Why isn’t trust transitive? In: Proceedings of the International Workshop on Security Protocols, (London, UK), pp. 171–176, Springer-Verlag.Google Scholar
  10. 10.
    E. Gerck (1998) Toward real-world models of trust. Scholar
  11. 11.
    T. Grandison (2003) Trust Management for Internet Applications. PhD thesis, Imperial College London.Google Scholar
  12. 12.
    A. Jøsang and S. Pope (2005) Semantic constraints for trust transitivity. In: S. Hartmann and M. Stumptner (eds), vol. 43 of CRPIT, pp. 59–68, Australian Computer Society.Google Scholar
  13. 13.
    C. Castelfranchi and R. Falcone (1998) Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In: ICMAS, pp. 72–79, IEEE Computer Society.Google Scholar
  14. 14.
    P. V. Rangan (1988) An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 204–211, IEEE Computer Society.Google Scholar
  15. 15.
    M. Abadi and M. R. Tuttle (1991) A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201–216.Google Scholar
  16. 16.
    J. Hintikka (1962) Knowledge and Belief. Cornell University Press.Google Scholar
  17. 17.
    W. van der Hoek (1990) Systems for knowledge and beliefs. In: J. van Eijck (ed), vol. 478 of Lecture Notes in Computer Science, pp. 267–281, Springer.Google Scholar
  18. 18.
    N. Friedman and J. Y. Halpern (1994) A knowledge-based framework for belief change, part I: Foundations. In: R. Fagin (ed), TARK, pp. 44–64, Morgan Kaufmann.Google Scholar
  19. 19.
    S. Kripke (1963) Semantical considerations on modal logic. Acta Philosophica Fennica, 16:83–94.MathSciNetGoogle Scholar
  20. 20.
    A. Jøsang (1999) An algebra for assessing trust in certification chains. In: NDSS 99, The Internet Society.Google Scholar
  21. 21.
    A. Jøsang, E. Gray, and M. Kinateder (2003) Analysing Topologies of Transitive Trust. In: T. Dimitrakos and F. Martinelli (eds) Proceedings of the First International Workshop on Formal Aspects in Security and Trust, (Pisa, Italy), pp. 9–22.Google Scholar
  22. 22.
    B. F. Chellas (1988) Modal logic: an introduction. Cambridge University Press.Google Scholar
  23. 23.
    C.-J. Liau (2003) Belief, information acquisition, and trust in multi-agent systems-a modal logic formulation. In: Artif. Intell., 149(1):31–60.CrossRefMathSciNetGoogle Scholar
  24. 24.
    The CareGrid project.
  25. 25.
    The Ponder2 project.

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Changyu Dong
    • 1
  • Giovanni Russello
    • 1
  • Naranker Dulay
    • 1
  1. 1.Department of Computing Imperial College LondonLondonUK

Personalised recommendations