Skip to main content

Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications

  • Conference paper
Autonomic and Trusted Computing (ATC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5586))

Included in the following conference series:

Abstract

Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called “cheating services” act as “attacks”, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Khare, R., Rifkin, A.: Trust management on the World Wide Web. Computer Networks and ISDN Systems Archive 30, 651–653 (1998)

    Article  Google Scholar 

  3. The NGOSS Technology Neutral Architecture, TMF 053, Version 5.7 (November 2006)

    Google Scholar 

  4. Strassner, J.: Policy Based Network Management. Morgan Kaufmann, San Francisco (2004)

    Google Scholar 

  5. Serrano, J.M., Serrat, J., Strassner, J., Foghlú, M.Ó.: Facilitating Autonomic Management for Service Provisioning using Ontology-Based Functions & Semantic Control. In: 3rd IEEE International Workshop on Broadband Convergence Networks (BCN) 2008 in IEEE/IFIP NOMS 2008, Salvador de Bahia, Brazil, April 07-11 (2008)

    Google Scholar 

  6. Strassner, J.: Introduction to DEN-ng., Tutorial for FP7 PanLab II Project (January 21, 2009)

    Google Scholar 

  7. Dressler, F., Carreras, I.: Advances in Biologically Inspired Information Systems: Models, Methods, and Tools. Springer, Heidelberg (2007)

    Book  MATH  Google Scholar 

  8. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, California, USA, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1966)

    Google Scholar 

  9. Blaze, M., Feigenbaum, J., Resnick, P., Strauss, M.: Managing Trust in an Information-Labeling System. European Transactions on Telecommunications (1997)

    Google Scholar 

  10. Camp, J., Genkina, A., Friedman, A.: Social and Network Trust, DIMACS, April 14-15, 2005. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ (2005)

    Google Scholar 

  11. Camp, J.: Trust and Risk in Internet Commerce, p. 293. MIT Press, Cambridge (2000)

    Google Scholar 

  12. Mumford, E.: Participative Systems Design: Practice and Theory. Journal of Occupational Behaviour 4(1), 47–57 (1983)

    Google Scholar 

  13. Abowd, G.D., Dey, A.K., Orr, R., Brotherton, J.: Context-awareness in wearable and ubiquitous computing. In: Intl. Symposium on Wearable Computers, pp. 179–180 (1997)

    Google Scholar 

  14. Brown, P.J., Bovey, J.D., Chen, X.: Context-Aware Applications: From the laboratory to the Marketplace. IEEE Personal Communications, 58–64 (1997)

    Google Scholar 

  15. Chen, G., Kotz, D.: A survey of context-aware mobile computing research, Technical Report, TR2000-381, Department of Computer Science, Dartmouth College (November 2000)

    Google Scholar 

  16. Brabham, D.C.: Crowdsourcing as a Model for Problem Solving. An Introduction and Cases. Intl. Journal of Research into New Media Technologies 14(1) (2008)

    Google Scholar 

  17. MacLean, et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proceedings of CHI, Conference on Human Factors in Computer Systems (1990)

    Google Scholar 

  18. Li, H., Zhang, X., Wu, H., Qu, Y.: Design and Application of Rule Based Access Control Policies. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)

    Google Scholar 

  19. Grandison, T., Sloman, M.: Specifying and Analysing Trust for internet Applications. In: Towards the knowledge Society: eCommerce,eBusiness and eGoverment. The Second IFIP International Conference on E-Commerce, E-Business, E-Government, Lisbon, Portugal (October 2002)

    Google Scholar 

  20. NetTrust Project, http://www.ljean.com/NetTrust/

  21. Lamparter, S., Agarwal, S.: Specification of Policies for Automatic Negotiations of Web Services. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)

    Google Scholar 

  22. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)

    Google Scholar 

  23. Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of Reputation-based and policy Trust Management. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)

    Google Scholar 

  24. Damianou, N., Bandara, A., Sloman, M., Lupu, E.: A Survey of Policy Specification Approaches, Dept. of Computing, Imperial College of Science Technology and Medicine, London, UK (2002)

    Google Scholar 

  25. Moore, E., Elleson, J., Strassner, J.: Policy Core Information Model-Version 1 Specification. IETF Request for comments (RFC 3060) (February 2001), http://www.ietf.org/rfc/rfc3060.txt

  26. Moore, E.: Policy Core Information Model-Extensions. IETF Request for comments (RFC 3460) (January 2003), http://www.ietf.org/rfc/rfc3460.txt

  27. DMTF, CIM schema, can be downloaded from, http://www.dmtf.org/standards/cim/cim_schema_v220/

  28. TMF SID schema, members only, can be downloaded from http://www.tmforum.org/page35501.aspx

  29. Strassner, J., Neuman de Souza, J., Raymer, D., Samudrala, S., Davy, S., Barrett, K.: The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. In: 5th Latino-America Netowrk and Operations Management Symposium (LANOMS), Salvador Bahia, Brazil (2007)

    Google Scholar 

  30. Strassner, J., Fu, Z.: Policy Based Enforcement of Ubiquitous Role Based Access Control. In: 4th International IEEE Workshop on Managing Ubiquitous Communications and Services (MUCS), Munich, Germany, May 25 (2007)

    Google Scholar 

  31. Davy, S., Jennings, B., Strassner, J.: The Policy Continuum – A Formal Model. In: Jennings, B., Serrat, J., Strassner, J. (eds.) Proc. of the 2nd IEEE International Workshop MACE, Multicon, Berlin. Multlicon Lecture Notes, No. 6, pp. 65–78 (2007)

    Google Scholar 

  32. Dasgupta, P.: Trust as a Commodity. In: Trust: Making and Breaking Cooperative Relations. Blackwell, Oxford (1988)

    Google Scholar 

  33. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  34. Sztompka, P.: Trust: A sociological Theory. Cambridge University Press, Cambridge (1999)

    Google Scholar 

  35. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)

    MATH  Google Scholar 

  36. Lampson, B., Rivest, R.: SDSI - A Simple Distributed Security Infrastructure. In: DIMACS Workshop on Trust Management in Networks, South Plainfield, NJ (1996)

    Google Scholar 

  37. De Paoli, S., Kerr, A.: Conceptualizing Trust. NIRSA Working Paper N. 40, National University of Ireland Maynooth (2008)

    Google Scholar 

  38. Meyerson, D., Weick, K.E., Kramer, R.M.: Swift Trust and Temporary Group. Trust in Organisations. Sage, Thousand Oaks (1996)

    Book  Google Scholar 

  39. Sloman, M.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, 215–333 (1994)

    Google Scholar 

  40. Strassner, J., Samudrala, S., Cox, G., Liu, Y., Jiang, M., Zhang, J., van der Meer, S., Foghlú, M.Ó., Donnelly, W.: The Design of a New Context-Aware Policy Model for Autonomic Networking. In: 5th IEEE ICAC, Chicago, Illinois, June 2-6 (2008)

    Google Scholar 

  41. De Bruijn, J., Fensel, D., Lara, R., Polleres, A.: OWL DL vs. OWL Flight: Conceptual Modelling and Reasoning for the Semantic Web (November 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Serrano, M., van der Meer, S., Strassner, J., De Paoli, S., Kerr, A., Storni, C. (2009). Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds) Autonomic and Trusted Computing. ATC 2009. Lecture Notes in Computer Science, vol 5586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02704-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02704-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02703-1

  • Online ISBN: 978-3-642-02704-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics