Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
The Semantics of Predicate Logic as a Programming Language
Journal of the ACM (JACM)
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Testing methodology for an ad hoc routing protocol
Proceedings of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks
A formal validation methodology for MANET routing protocols based on nodes' self similarity
Computer Communications
Trust management tools for internet applications
iTrust'03 Proceedings of the 1st international conference on Trust management
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
A Flexible and Efficient Alert Correlation Platform for Distributed IDS
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
FSM-Based Test Derivation Strategies for Systems with Time-Outs
QSIC '11 Proceedings of the 2011 11th International Conference on Quality Software
Prevent DNS Cache Poisoning Using Security Proxy
PDCAT '11 Proceedings of the 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
A vector based model approach for defining trust in Multi-Organization Environments
CRISIS '12 Proceedings of the 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
A formal data-centric approach for passive testing of communication protocols
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
As the Digital Ecosystems are growing in use and in popularity, the need to boost the methods concerned by their interoperability is growing as well; making thus trustworthy interactions of the different agents (e.g., network systems) a priority. In our work, we focus on "soft trust", that is trust management systems that can be based on experience and reputation. Each trust system defines how they evaluate the trustee experience. The observations of the trustee behaviors are added to the trustee experience. Furthermore, most of the works dedicated to trust estimations in different kinds of ecosystems are based on local observations through monitored entities. No formal approaches have been defined for distributed monitored elements by considering several points of observations. This is what we intend in this work. We propose to use distributed network monitoring techniques to analyze the packets that the truster and trustee exchange in order to prove the trustee is acting in a trustworthy manner. A formal approach is defined to express trust properties and to evaluate them on real execution traces. Our approach is applied on DNS traces for assessing the trust among the entities.