REFEREE: trust management for Web applications
Selected papers from the sixth international conference on World Wide Web
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Security in Computing (4th Edition)
Security in Computing (4th Edition)
A survey of trust and reputation systems for online service provision
Decision Support Systems
Why Trust is not Proportional to Risk
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
A trust management framework for service-oriented environments
Proceedings of the 18th international conference on World wide web
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Hi-index | 0.00 |
We propose a new paradigm---named the Pervasive Trust Foundation (PTF) ---for computer security in Next Generation Networks, including the Future Internet. We start with a review of basic trust-related terms and concepts. We present motivation for using PTF as the basis for security in ISO OSI networks. The paper includes our five contributions. First, we define trust in the small (TIS) and trust in the large (TIL), where TIL is equivalent to PTF. Second, we list and contrast required and prohibited features of PTF-based systems. Third, we enumerate claims of benefits derived from using PTF. Fourth, we identify two major obstacles to PTF realization, and discuss multiple approaches to overcoming these obstacles. The more important of the two obstacles can be eliminated by showing an efficient implementation of PTF-based security. Fifth, we present an outline for the Basic Reference Model for PTF for Next Generation Networks. Summary and discussion of future work concludes the paper.