Knowledge and common knowledge in a distributed environment
Journal of the ACM (JACM)
A guide to completeness and complexity for modal logics of knowledge and belief
Artificial Intelligence
Reasoning about knowledge
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Distributed Algorithms
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
A Description Logic for PKI Trust Domain Modeling
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
An ontology of trust: formal semantics and transitivity
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Handbook of Modal Logic, Volume 3 (Studies in Logic and Practical Reasoning)
Handbook of Modal Logic, Volume 3 (Studies in Logic and Practical Reasoning)
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Bayesian Model for Event-based Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
Electronic Notes in Theoretical Computer Science (ENTCS)
The complexity of fixed point models of trust in distributed networks
Theoretical Computer Science
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Dynamic Epistemic Logic
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Security, Group Size, and the Human Brain
IEEE Security and Privacy
IEEE Security and Privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
A calculus for trust management
FSTTCS'04 Proceedings of the 24th international conference on Foundations of Software Technology and Theoretical Computer Science
Analysis and modelling of trust in distributed information systems
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |
We propose computational, declarative definitions of the concepts of weak and strong trust relations between interacting agents, and trust domains of trust-related agents in distributed systems. Our definitions yield computational complexity results for deciding potential and actual trust relationships and membership in trust domains. We instantiate our trust concepts in four major applications of trust, namely: Trusted Third Parties (TTPs), the Web of Trust, Public-Key Infrastructures (PKIs), and Identity-Based Cryptography. Finally, we point out computational means for building trust, and by that, building up trust relations and trust domains. Our defining principle for weak and strong trust is (common) belief in and knowledge of agent correctness, respectively