Evidence-Based trust reasoning

Jingwei Huang, David M. Nicol

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Trust is a necessary component in cybersecurity. It is a common task for a system to make a decision about whether or not to trust the credential of an entity from another domain, issued by a third party. Generally, in the cyberspace, connected and interacting systems largely rely on each other with respect to security, privacy, and performance. In their interactions, one entity or system needs to trust others, and this "trust" frequently becomes a vulnerability of that system. Aiming at mitigating the vulnerability, we are developing a computational theory of trust, as a part of our efforts towards Science of Security. Previously, we developed a formal-semantics-based calculus of trust [3, 2], in which trust can be calculated based on a trustor's direct observation on the performance of the trustee, or based on a trust network. In this paper, we construct a framework for making trust reasoning based on the observed evidence. We take privacy in cloud computing as a driving application case [5].

Original languageEnglish (US)
Title of host publicationProceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
PublisherAssociation for Computing Machinery
ISBN (Print)9781450329071
DOIs
StatePublished - 2014
Event2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014 - Raleigh, NC, United States
Duration: Apr 8 2014Apr 9 2014

Publication series

NameACM International Conference Proceeding Series

Other

Other2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014
Country/TerritoryUnited States
CityRaleigh, NC
Period4/8/144/9/14

Keywords

  • Evidence-based trust
  • Privacy
  • Trust model

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Evidence-Based trust reasoning'. Together they form a unique fingerprint.

Cite this