An Adaptive Trust Control Model for a Trustworthy Component Software Platform

  • Zheng Yan
  • Christian Prehofer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


Trust has been recognized as a vital factor for a component software platform. Inside the platform, trust of a platform entity can be controlled according to its assessment result. Special control modes can be applied in order to ensure a trustworthy system. In this paper, we present an adaptive trust control model in order to support autonomic trust management for the component software platform. This model is based on a Fuzzy Cognitive Map. It includes the quality attributes of the platform entity and a number of control modes supported by the platform in order to ensure the entity’s trustworthiness. The parameters of this model can be adaptively adjusted in order to reflect real system context. The simulation results show that this model is effective for automatically predicting and selecting feasible control modes for a trustworthy platform. It also helps studying cross-influence of applied control modes on a number of quality attributes.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Denning, D.E.: A New Paradigm for Trusted Systems. In: Proceedings of the IEEE New Paradigms Workshop (1993) Google Scholar
  2. 2.
    TCG TPM Specification v1.2 (2003),
  3. 3.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications and Survey, Forth Quarter 3(4), 2–16 (2000)Google Scholar
  4. 4.
    Banerjee, S., Mattmann, C.A., Medvidovic, N., Golubchik, L.: Leveraging Architectural Models to Inject Trust into Software Systems. ACM SIGSOFT Software Engineering Notes. In: Proceedings of the 2005 workshop on software engineering for secure systems—building trustworthy applications SESS 2005, vol. 30(4) (2005)Google Scholar
  5. 5.
    Zhang, Z., Wang, X., Wang, Y.: A P2P Global Trust Model Based on Recommendation. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3975–3980 (2005)Google Scholar
  6. 6.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Enhancing Grid Security with Trust Management. In: Proceedings of IEEE International Conference on Services Computing, pp. 303–310 (2004)Google Scholar
  7. 7.
    Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Area in Communications 24(2), 305–317 (2006)zbMATHCrossRefGoogle Scholar
  8. 8.
    Zhou, M., Mei, H., Zhang, L.: A Multi-Property Trust Model for Reconfiguring Component Software. In: The Fifth International Conference on Quality Software QAIC 2005, pp. 142–149 (2005)Google Scholar
  9. 9.
    Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Yan, Z., MacLaverty, R.: Autonomic Trust Management in a Component Based Software System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 279–292. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Kosko, B.: Fuzzy Cognitive Maps. International Journal Man-Machine Studies 24, 65–75 (1986)zbMATHCrossRefGoogle Scholar
  12. 12.
    Robocop, Space4U and Trust4All website:

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Zheng Yan
    • 1
  • Christian Prehofer
    • 1
  1. 1.Nokia Research Center, HelsinkiFinland

Personalised recommendations