Skip to main content
Log in

A simple game for the study of trust in distributed systems

  • Invited Papers
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Trust is an important aspect of the design and analysis of secure distributed systems. It is often used informally to designate those portions of a system that must function correctly in order to achieve the desired outcome. But it is a notoriously diffcult notion to formalize. What are the properties of trust? How is it learned, propagated, and utilized successfully? How can it be modeled? How can a trust model be used to derive protocols that are effcient and reliable when employed in today’s expansive networks? Past work has been concerned with only a few of these issues, without concentrating on the need for a comprehensive approach to trust modeling.

In this paper, we take a first step in that direction by studying an artificial community of agents that uses a notion of trust to succeed in a game against nature. The model is simple enough to analyze and simulate, but also rich enough to exhibit phenomena of real-life interactive communities. The model requires agents to make decisions. To do well, the agents are informed by knowledge gained from their own past experience as well as from the experience of other agents. Communication among agents allows knowledge to propagate faster through the network, which in turn can allow for a more successful community. We analyze the model from both a theoretical and an experimental point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Birell A D, Lampson B W, Needham R M,et al. A Global Authentication Service Without Global Trust. Symposium on Security and Privacy, Oakland: IEEE, 1986. 222–230.

    Google Scholar 

  2. Gasser M, Goldstein A, Kaufman C,et al. The Digital Distributed System Security Architecture.Proc. 12th ACM NIST/NCSCNational Computer Security Conference. Oct. 1989. 305–319.

  3. Kent S. Internet Privacy Enhanced Mail. Communications of the ACM, 1993,36(8):48–60.

    Article  Google Scholar 

  4. Yahalom R, Klein B, Beth T. Trust Relationships in Secure Systems-Adistributed Authentication Perspective.Proc. IEEE Symposium on Research in Security and Provacy. 1993. 150–164.

  5. Zimmerman P. The O6cial PGP User’s Guide. MIT-Press, 1995.

  6. Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks.Proc. European Symposium on Research in Computer Security (ESORICS) 1994,Lecture Notes in Computer Science. Springer-Verlag, 1995, 3–18.

  7. Maurer U. Modelling a Public-Key Infrastructure. E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editorsProc European Symposium on Research in Computer Security (ESORICS) 1996,Lecture Notes in Computer Science. New York: Springer-Verlag, 1997. 325–350.

    Google Scholar 

  8. Reiter M K, Stubblebine S G. Resilient Authentication Using Path Independence. IEEE Trans. Comput, 1998,47(12): 1351–1362.

    Article  MathSciNet  Google Scholar 

  9. Tarah A, Huitema C. Associating Metrics to Certification Paths.Proc European Symposium on Research in Computer Security (ESORICS) 1992,Lecture Notes in Computer Science. Springer-Verlag, 1993. 175–189.

  10. Reiter M K, Stubblebine S G. Authentication Metric Analysis and Design.ACM Transactions on Information and System Security, 1999,2(2): 138–158.

    Article  Google Scholar 

  11. Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management.Proc IEEE Symposium on Security and Privacy. 1996.

  12. Burrows M, Abadi M, Needham R. A Logic of Authentication.ACM Transactions on Computer Systems. Feb. 1990.

  13. Gong L, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols.Proc IEEESymposium on Security and Privacy. 1990. 234–248.

  14. Rangan P V. An Axiomatic Theory of Trust in Secure Communication Protocols.Computers and Security Elsevier Science Publishers Ltd., Oxford, 1992. 163–172.

    Google Scholar 

  15. Blaze M, Feigenbaum J, Keromytis A. Keynote: Trust Management for Public-Key Infrastructures.Proc 1998Cambridge Security Protocols International Workshop, volume 1550of Lecture Notes in Computer Science. Springer, 1999. 59–63.

  16. Chu Y H, Feigenbaum J, LaMacchia B,et al. REFEREE: Trust Management for Web Applications.World Wide Web Journal, 1997,2: 127–139.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Biography: Zoë Diamadidi(1973-), female, Ph. D. candidate, research direction: distributed computing.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Diamadi, Z., Fischer, M.J. A simple game for the study of trust in distributed systems. Wuhan Univ. J. of Nat. Sci. 6, 72–82 (2001). https://doi.org/10.1007/BF03160228

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03160228

Key words

CLC number

Navigation