Trust Modeling for Peer-to-Peer Based Computing Systems
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
Computer
Trust Based Risk Management for Distributed System Security - A New Approach
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
A fuzzy model for reasoning about reputation in web services
Proceedings of the 2006 ACM symposium on Applied computing
Trust Assessment Using Provenance in Service Oriented Applications
EDOCW '06 Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops
An Agent-Based Approach to Grid Service Monitoring
ISPDC '06 Proceedings of the Proceedings of The Fifth International Symposium on Parallel and Distributed Computing
Adaptive Trust Negotiation and Access Control for Grids
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
UMLtrust: towards developing trust-aware software
Proceedings of the 2008 ACM symposium on Applied computing
CAT: a context-aware trust model for open and dynamic systems
Proceedings of the 2008 ACM symposium on Applied computing
Risk models for trust-based access Control(TBAC)
iTrust'05 Proceedings of the Third international conference on Trust Management
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Hi-index | 0.00 |
While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors for potential vulnerabilities they may invite to the total system. In this paper, we propose an Automatic Trust Monitoring algorithm called ATM based on the specification of trust relationships in trust scenarios and the quantification of the relationships through trust calculation schemes. Trust rules are generated from the trust scenarios ready to be deployed at run-time. A service requestor is penalized for the violation of a trust rule and rewarded for no such violation. This analysis facilitates the quantification of the trustworthiness of service requestors and the accuracy of the recommendations from other service providers that can be used to make dynamic decisions on the corresponding requestors. The monitor is implemented in a prototype file sharing grid and evaluated using file sharing applications.