Abstract
In a distributed system entities perform their respective activities by consuming or providing each other services. For the entities deployed in a global computing scenario it is important to be aware of the trustworthiness of each other. Trust-awareness enables entities to decide either which service provider to refer to or whether to accept a service request from a client; additionally, trust degrees enable entities to negotiate which security measures to employ for interacting with each other.
This paper describes TAw, an implementation of the social reputation model described in [11,12]; TAw is a peer-to-peer architecture designed to maintain the notion of reputation in a global computing environment and integrate existing naming technologies. A TAw peer is transparently interposed between a client application and the naming service. TAw peers proactively gossip with each other exchanging trust information; the gossiping technique allows the whole system to scalably and flexibly maintain trust information in a human-like manner.
This work has been partially supported by the European FP5 RTD project TAPAS (IST-2001-34069) and by the base project “WebMiNDS” under the FIRB program of the Italian Ministry of Education, University and Research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of 10th International Conference on Information and Knowledge Management (2001)
Azzedin, F., Maheswaran, M.: Integrating Trust into Grid Resource Management Systems. In: Proceedings of International Conference on Parallel Processing (2002)
Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (2002)
Azzedin, F., Maheswaran, M.: Towards Trust-Aware Resource Mnagement in Grid Computing Systems. In: Proceedings of First IEEE International Workshop on Security and Grid Computing (2002)
Buchegger, S., Le Boudec, J.-Y.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2003), Sophia-Antipolis, France (March 2003)
Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: Proceedings of International Conference on Software Engineering and Formal Methods (2003)
Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic Algorithms for Replicated Database Maintenance. In: Proceedings of the 6th Symposium on Principles of Distributed Computing (1987)
Dragovic, B., Hand, S., Harris, T., Kotsovinos, E., Twigg, A.: Managing Trust and Reputation in the XenoServer Open Platform. In: Proceedings of First International Conference on Trust Management (2003)
Eugster, P., Guerraoui, R., Handurukande, S., Kermarrec, A., Kouznetsov, P.: Lightweight Probabilistic Broadcast. In: Proceedings of the The International Conference on Dependable Systems and Networks (2001)
Kermarrec, A., Massoulié, L., Ganesh, A.: Probabilistic and Reliable Dissemination in Large Scale Systems. IEEE Transactions on Parallel and Distributed Systems 14(2) (2003)
Mezzetti, N.: Towards a Model for Trust Relationships in Virtual Enterprises. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications, Prague, Czech Republic, September 1-5, pp. 420–424. IEEE Computer Society, Los Alamitos (2003)
Mezzetti, N.: A Socially-Inspired Reputation Model. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 191–204. Springer, Heidelberg (2004)
The Openprivacy Project, http://www.openprivacy.org/
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of New Security Paradigms Workshop (1997)
Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of 33rd Hawaii International Conference on System Sciences (2000)
Zhoh, L., Schneider, F., van Renesse, R.: APSS: Proactive secret sharing in asynchronous systems. Cornell Computer Science Department. Technical report 2002- 1877. Submitted to ACM Transactions on Information and System Security (2002)
Zhoh, L., Schneider, F., van Renesse, R.: COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems 20(4), 329–368 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mezzetti, N. (2004). Enabling Trust-Awareness in Naming Services. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-30079-3_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22919-3
Online ISBN: 978-3-540-30079-3
eBook Packages: Springer Book Archive