Abstract
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called “cheating services” act as “attacks”, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)
Khare, R., Rifkin, A.: Trust management on the World Wide Web. Computer Networks and ISDN Systems Archive 30, 651–653 (1998)
The NGOSS Technology Neutral Architecture, TMF 053, Version 5.7 (November 2006)
Strassner, J.: Policy Based Network Management. Morgan Kaufmann, San Francisco (2004)
Serrano, J.M., Serrat, J., Strassner, J., Foghlú, M.Ó.: Facilitating Autonomic Management for Service Provisioning using Ontology-Based Functions & Semantic Control. In: 3rd IEEE International Workshop on Broadband Convergence Networks (BCN) 2008 in IEEE/IFIP NOMS 2008, Salvador de Bahia, Brazil, April 07-11 (2008)
Strassner, J.: Introduction to DEN-ng., Tutorial for FP7 PanLab II Project (January 21, 2009)
Dressler, F., Carreras, I.: Advances in Biologically Inspired Information Systems: Models, Methods, and Tools. Springer, Heidelberg (2007)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, California, USA, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1966)
Blaze, M., Feigenbaum, J., Resnick, P., Strauss, M.: Managing Trust in an Information-Labeling System. European Transactions on Telecommunications (1997)
Camp, J., Genkina, A., Friedman, A.: Social and Network Trust, DIMACS, April 14-15, 2005. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ (2005)
Camp, J.: Trust and Risk in Internet Commerce, p. 293. MIT Press, Cambridge (2000)
Mumford, E.: Participative Systems Design: Practice and Theory. Journal of Occupational Behaviour 4(1), 47–57 (1983)
Abowd, G.D., Dey, A.K., Orr, R., Brotherton, J.: Context-awareness in wearable and ubiquitous computing. In: Intl. Symposium on Wearable Computers, pp. 179–180 (1997)
Brown, P.J., Bovey, J.D., Chen, X.: Context-Aware Applications: From the laboratory to the Marketplace. IEEE Personal Communications, 58–64 (1997)
Chen, G., Kotz, D.: A survey of context-aware mobile computing research, Technical Report, TR2000-381, Department of Computer Science, Dartmouth College (November 2000)
Brabham, D.C.: Crowdsourcing as a Model for Problem Solving. An Introduction and Cases. Intl. Journal of Research into New Media Technologies 14(1) (2008)
MacLean, et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proceedings of CHI, Conference on Human Factors in Computer Systems (1990)
Li, H., Zhang, X., Wu, H., Qu, Y.: Design and Application of Rule Based Access Control Policies. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)
Grandison, T., Sloman, M.: Specifying and Analysing Trust for internet Applications. In: Towards the knowledge Society: eCommerce,eBusiness and eGoverment. The Second IFIP International Conference on E-Commerce, E-Business, E-Government, Lisbon, Portugal (October 2002)
NetTrust Project, http://www.ljean.com/NetTrust/
Lamparter, S., Agarwal, S.: Specification of Policies for Automatic Negotiations of Web Services. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)
Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of Reputation-based and policy Trust Management. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)
Damianou, N., Bandara, A., Sloman, M., Lupu, E.: A Survey of Policy Specification Approaches, Dept. of Computing, Imperial College of Science Technology and Medicine, London, UK (2002)
Moore, E., Elleson, J., Strassner, J.: Policy Core Information Model-Version 1 Specification. IETF Request for comments (RFC 3060) (February 2001), http://www.ietf.org/rfc/rfc3060.txt
Moore, E.: Policy Core Information Model-Extensions. IETF Request for comments (RFC 3460) (January 2003), http://www.ietf.org/rfc/rfc3460.txt
DMTF, CIM schema, can be downloaded from, http://www.dmtf.org/standards/cim/cim_schema_v220/
TMF SID schema, members only, can be downloaded from http://www.tmforum.org/page35501.aspx
Strassner, J., Neuman de Souza, J., Raymer, D., Samudrala, S., Davy, S., Barrett, K.: The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. In: 5th Latino-America Netowrk and Operations Management Symposium (LANOMS), Salvador Bahia, Brazil (2007)
Strassner, J., Fu, Z.: Policy Based Enforcement of Ubiquitous Role Based Access Control. In: 4th International IEEE Workshop on Managing Ubiquitous Communications and Services (MUCS), Munich, Germany, May 25 (2007)
Davy, S., Jennings, B., Strassner, J.: The Policy Continuum – A Formal Model. In: Jennings, B., Serrat, J., Strassner, J. (eds.) Proc. of the 2nd IEEE International Workshop MACE, Multicon, Berlin. Multlicon Lecture Notes, No. 6, pp. 65–78 (2007)
Dasgupta, P.: Trust as a Commodity. In: Trust: Making and Breaking Cooperative Relations. Blackwell, Oxford (1988)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)
Sztompka, P.: Trust: A sociological Theory. Cambridge University Press, Cambridge (1999)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)
Lampson, B., Rivest, R.: SDSI - A Simple Distributed Security Infrastructure. In: DIMACS Workshop on Trust Management in Networks, South Plainfield, NJ (1996)
De Paoli, S., Kerr, A.: Conceptualizing Trust. NIRSA Working Paper N. 40, National University of Ireland Maynooth (2008)
Meyerson, D., Weick, K.E., Kramer, R.M.: Swift Trust and Temporary Group. Trust in Organisations. Sage, Thousand Oaks (1996)
Sloman, M.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, 215–333 (1994)
Strassner, J., Samudrala, S., Cox, G., Liu, Y., Jiang, M., Zhang, J., van der Meer, S., Foghlú, M.Ó., Donnelly, W.: The Design of a New Context-Aware Policy Model for Autonomic Networking. In: 5th IEEE ICAC, Chicago, Illinois, June 2-6 (2008)
De Bruijn, J., Fensel, D., Lara, R., Polleres, A.: OWL DL vs. OWL Flight: Conceptual Modelling and Reasoning for the Semantic Web (November 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Serrano, M., van der Meer, S., Strassner, J., De Paoli, S., Kerr, A., Storni, C. (2009). Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds) Autonomic and Trusted Computing. ATC 2009. Lecture Notes in Computer Science, vol 5586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02704-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-02704-8_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02703-1
Online ISBN: 978-3-642-02704-8
eBook Packages: Computer ScienceComputer Science (R0)