A Method to Incorporate Negative Value into a Trust Model

F. Azimzadeh(1*), S. Khatun(2), B. M. Ali(3)

(1) Universiti Putra Malaysia, Malaysia
(2) Department of Computer & Communication Systems Engineering, University Putra Malaysia, Malaysia
(3) Department of Electronics and Computer Engineering, Universiti Putra Malaysia, Malaysia
(*) Corresponding author


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Trust is an important issue for security. Trust issues influence not only the specification of security policies but also the techniques needed to manage and implement security policies for systems. Certification is one of the main components trust models. Traditional trust model did not consider revocation of certification, but usually revocation happens. Maurer’s trust model has been used by most researches. The model including two parts: deterministic and probabilistic model. In this paper we have used a tailored form of “credential networks” to incorporate revocation statues in deterministic model. By incorporating revocation, we have omitted the path of trust include the certification revocation in the probabilistic model.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Trust Model; Certification; Revocation; PKI

Full Text:

PDF


References


I. Ray , S. Chakraborty, A vector model of trust for developing trustworthy systems, Proc. European Symposium on Research in Computer Security ESORICS’04, LNCS 3193. Springer-Verlag, September 2004.

G. Theodorakopoulos, J. S. Baras, On trust models and trust evaluation metrics for Ad Hoc networks, IEEE Journal on Selected Areas in Communications, Vol. 24, 2006.

U. Maurer, Modelling a Publik Key Infrastructure, Proc. European Symposium on Research in Computer Security ESORICS’96, LNCS 1146.Springer-Verlag, September 1996.

M. K. Reiter, S. G. Stubblebine, Authentication metric analysis and design, ACM Transactions on Information and System Security, Vol. 2, PP. 138-158, 1999

K. Bicakci, B. Crispo, A. S. Tanenbaum, How to incorporate revocation status information into the trust metrics for Public-Key Certification, Proc. ACM Symposium on applied Computing , SAC’o5,New Mexico, USA, 2005, pp. 1594 - 1598

J. Jonczy, R. Haenni, Credential Networks: a general model for distributed trust and authenticity management, Research supported by the Swiss National Science Foundation, Project No. PP002–102652/1.

J. Marchesini , S. Smith.S, Modeling public key infrastructure in the real world”, Proc. Appeared in Public Key Infrastructure: EuroPKI , 2005.

C. Adams, M. Burmester, Y. Desmedt, M. Reiter, P. Zimmermann, Which PKI (Public Key Infrastructure) is the right one?, Proc. 7th ACM conference on Computer and communications, Athens, Greece, 2000, pp. 98 - 101

M. Burmester, Y.G. Desmedt, Is hierarchical Public-Key Certification the next target for hackers?, Communications of the ACM, Vol. 47, 2004

R. Haenni, Web of trust: Applying probabilistic argumentation to Public-Key Cryptography, Proc. ECSQARU 2003, LN AI 2711, 2003, pp. 243–254.

R. Kohlas, U.Maurer, Confidence valuation in a Public-Infrastructure based on uncertain evidence, International Workshop on Practice and Theory in Public- Key Cryptography 2000, PKC2000, Lecture Notes of Computer Science, Springer, 2000.

S. L. Garfinkel, D. Margrave, J. I. Schiller, E.Nordlander, R.C. Miller, How to make secure email easier to use, Proc. SIGCHI conference on Human factors in computing systems, Portland, Oregon, USA, 2005, pp. 701 - 710

P. Wohlmacher, “Digital Certificates: A survey of revocation methods, Proc. ACM workshops on Multimedia, MULTIMEDIA '00, 2000

P. Avesani, P. Massa, R. Tiella, “A trust_ enhanced recommender system application: Moleskiing”, Proc. ACM symposium on Applied computing SAC '05,2005

J. Ma , M. A. Orgun, Trust management and trust theory revision , IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART A: SYSTEMS AND HUMANS, VOL. 36,P.451, 2006

M. Ahamad, W. Lee, L. Liu, Gurding the next internet frontier: Countering denial of information attacks, Proc. Workshop on New Security Paradigms NSPW ’02, 2002

M. K. Reiter, S. G. Stubblebine, Authentication metric analysis and design, ACM Transactions on Information and System Security, Vol. 2, PP. 138–158, 1999.

R. Kohlas, U. Maurer, Confidence valuation in a Public- key Infrastructure based on uncertain evidence, Proc. International Workshop on Practice and Theory in Public- Key Cryptography 2000, PKC2000, Lecture Notes of Computer Science,Springer, 2000.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize