Skip to main content
main-content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

Logics to Reason Formally About Trust Computation and Manipulation

verfasst von : Alessandro Aldini, Mirko Tagliaferri

Erschienen in: Emerging Technologies for Authorization and Authentication

Verlag: Springer International Publishing

share
TEILEN

Abstract

Trust represents a fundamental, complementary ingredient for the success of security mechanisms in computer science, as it goes beyond the intrinsic, technical aspects of cybersecurity, by involving the subjective perception of users, the willingness to collaborate and expose own resources and capabilities, and the judgement about the expected behavior of other parties. Computational notions of trust are formalized to support automatically the process of building and maintaining trust infrastructures, and mathematical logics provide the formal means to reason about the efficacy of such a process. In this work we advocate the use of two logical approaches to the modeling and verification of the two main tasks at the base of any trust infrastructure: the initial computation of trust values and the dynamic manipulation of such values.
Fußnoten
1
Notice that it is also possible to base the semantics of LCT on notions stronger than belief, like, e.g., classical definitions of knowledge from epistemic modal logic. However, we prefer using belief as it is a more general notion and it can capture better the cognitive states of human agents.
 
Literatur
1.
Zurück zum Zitat Aldini, A.: Modeling and verification of trust and reputation systems. J. Secur. Commun. Netw. 8(16), 2933–2946 (2015) CrossRef Aldini, A.: Modeling and verification of trust and reputation systems. J. Secur. Commun. Netw. 8(16), 2933–2946 (2015) CrossRef
3.
Zurück zum Zitat Alexopoulos, N., Daubert, J., Mühlhäuser, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: IEEE Trustcom/BigDataSE/ICESS, pp. 546–553. IEEE (2017) Alexopoulos, N., Daubert, J., Mühlhäuser, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: IEEE Trustcom/BigDataSE/ICESS, pp. 546–553. IEEE (2017)
4.
Zurück zum Zitat Anakath, A., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 22, 10817–10823 (2019) CrossRef Anakath, A., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 22, 10817–10823 (2019) CrossRef
5.
Zurück zum Zitat Barber, B.: The Logic and Limits of Trust. Rutgers University Press, New Brunswick (1983) Barber, B.: The Logic and Limits of Trust. Rutgers University Press, New Brunswick (1983)
6.
Zurück zum Zitat Bateson, P.: The biological evolution of cooperation and trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 31–48. Blackwell, New York (1988) Bateson, P.: The biological evolution of cooperation and trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 31–48. Blackwell, New York (1988)
7.
Zurück zum Zitat van Benthem, J., Fernández-Duque, D., Pacuit, E.: Evidence logic: a new look at neighborhood structures. Adv. Modal Log. 9, 97–118 (2012) MathSciNetMATH van Benthem, J., Fernández-Duque, D., Pacuit, E.: Evidence logic: a new look at neighborhood structures. Adv. Modal Log. 9, 97–118 (2012) MathSciNetMATH
10.
Zurück zum Zitat Castelfranchi, C., Falcone, R.: Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In: International Conference on Multi Agent Systems (ICMAS), pp. 72–79. IEEE (1988) Castelfranchi, C., Falcone, R.: Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In: International Conference on Multi Agent Systems (ICMAS), pp. 72–79. IEEE (1988)
11.
Zurück zum Zitat Chapin, P.C., Skalka, C., Wang, X.S.: Authorization in trust management: features and foundations. Comput. Surv. 40(3), 9:1–9:48 (2008) CrossRef Chapin, P.C., Skalka, C., Wang, X.S.: Authorization in trust management: features and foundations. Comput. Surv. 40(3), 9:1–9:48 (2008) CrossRef
12.
Zurück zum Zitat Coleman, J.: Foundations of Social Theory. Harvard University Press, Cambridge (1990) Coleman, J.: Foundations of Social Theory. Harvard University Press, Cambridge (1990)
13.
Zurück zum Zitat Dasgupta, P.: Trust as a commodity. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 49–72. Blackwell, New York (1988) Dasgupta, P.: Trust as a commodity. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 49–72. Blackwell, New York (1988)
14.
Zurück zum Zitat Drawel, N., Bentahar, J., Laarej, A.: Verifying temporal trust logic using CTL model checking. In: 20th International Workshop on Trust in Agent Societies. CEUR-WS (2018) Drawel, N., Bentahar, J., Laarej, A.: Verifying temporal trust logic using CTL model checking. In: 20th International Workshop on Trust in Agent Societies. CEUR-WS (2018)
15.
Zurück zum Zitat Fehr, E.: On the economics and biology of trust. J. Eur. Econ. Assoc. 7, 235–266 (2009) CrossRef Fehr, E.: On the economics and biology of trust. J. Eur. Econ. Assoc. 7, 235–266 (2009) CrossRef
16.
Zurück zum Zitat Hardin, R.: The street-level epistemology of trust. Polit. Soc. 21, 505–529 (1993) CrossRef Hardin, R.: The street-level epistemology of trust. Polit. Soc. 21, 505–529 (1993) CrossRef
17.
Zurück zum Zitat Hardin, R.: Trust and Trustworthiness. Russell Sage Foundation, New York (2002) Hardin, R.: Trust and Trustworthiness. Russell Sage Foundation, New York (2002)
18.
19.
Zurück zum Zitat Husseini, A., M’Hamed, A., ElHassan, B.A., Mokhtaari, M.: A novel trust-based authentication scheme for low-resource devices in smart environments. Pers. Ubiquit. Comput. 5(5), 362–369 (2011) Husseini, A., M’Hamed, A., ElHassan, B.A., Mokhtaari, M.: A novel trust-based authentication scheme for low-resource devices in smart environments. Pers. Ubiquit. Comput. 5(5), 362–369 (2011)
22.
Zurück zum Zitat Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007) CrossRef Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007) CrossRef
23.
Zurück zum Zitat Kim, H., Lee, E.A.: Authentication and authorization for the Internet of Things. IEEE IT Prof. 19(5), 27–33 (2017) CrossRef Kim, H., Lee, E.A.: Authentication and authorization for the Internet of Things. IEEE IT Prof. 19(5), 27–33 (2017) CrossRef
25.
Zurück zum Zitat Levi, M.: A state of trust. In: Braithwaite, V., Levi, M., Cook, K., Hardin, R. (eds.) Trust and Governance, pp. 77–101. Russell Sage Foundation, New York (1998) Levi, M.: A state of trust. In: Braithwaite, V., Levi, M., Cook, K., Hardin, R. (eds.) Trust and Governance, pp. 77–101. Russell Sage Foundation, New York (1998)
26.
Zurück zum Zitat Luhmann, N.: Trust and Power. Wiley, New York (1979) Luhmann, N.: Trust and Power. Wiley, New York (1979)
27.
Zurück zum Zitat Mármol, F.G., Pérez, G.M.: Trust and reputation models comparison. Internet Res. 21(2), 138–153 (2011) CrossRef Mármol, F.G., Pérez, G.M.: Trust and reputation models comparison. Internet Res. 21(2), 138–153 (2011) CrossRef
28.
Zurück zum Zitat Marsh, S.: Formalising Trust as a Computational Concept. University of Stirling, Scotland (1994) Marsh, S.: Formalising Trust as a Computational Concept. University of Stirling, Scotland (1994)
29.
Zurück zum Zitat Mousa, H., Mokhtar, S.B., Hasan, O., Younes, O., Hadhoud, M., Brunie, L.: Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput. Netw. 90, 49–73 (2015) CrossRef Mousa, H., Mokhtar, S.B., Hasan, O., Younes, O., Hadhoud, M., Brunie, L.: Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput. Netw. 90, 49–73 (2015) CrossRef
31.
Zurück zum Zitat Nissenbaum, H.: Securing trust online: wisdom or oxymoron. Boston Univ. Law Rev. 81(3), 635–664 (2001) Nissenbaum, H.: Securing trust online: wisdom or oxymoron. Boston Univ. Law Rev. 81(3), 635–664 (2001)
32.
Zurück zum Zitat Nunoo-Mensah, H., Boateng, K.O., Gadze, J.D.: The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int. J. Commun. Syst. 31(7), e3444 (2018) CrossRef Nunoo-Mensah, H., Boateng, K.O., Gadze, J.D.: The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int. J. Commun. Syst. 31(7), e3444 (2018) CrossRef
34.
Zurück zum Zitat Rasmusson, L., Jansson, S.: Simulated social control for secure Internet commerce. In: Proceedings of the Workshop on New Security Paradigms, pp. 18–25 (1996) Rasmusson, L., Jansson, S.: Simulated social control for secure Internet commerce. In: Proceedings of the Workshop on New Security Paradigms, pp. 18–25 (1996)
35.
Zurück zum Zitat Robbins, B.G.: What is trust? A multidisciplinary review, critique, and synthesis. Sociol. Compass 10(10), 972–986 (2016) CrossRef Robbins, B.G.: What is trust? A multidisciplinary review, critique, and synthesis. Sociol. Compass 10(10), 972–986 (2016) CrossRef
36.
Zurück zum Zitat Schelling, T.: The Strategy of Conflict. Harvard University Press, Cambridge (1960) MATH Schelling, T.: The Strategy of Conflict. Harvard University Press, Cambridge (1960) MATH
38.
Zurück zum Zitat Singh, M.P.: Trust as dependence: a logical approach. In: 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 863–870 (2011) Singh, M.P.: Trust as dependence: a logical approach. In: 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 863–870 (2011)
39.
Zurück zum Zitat Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2), 85–92 (2007) Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2), 85–92 (2007)
41.
Zurück zum Zitat Tagliaferri, M., Aldini, A.: A taxonomy of computational models for trust computing in decision-making procedures. In: 17th European Conference on Cyber Warfare and Security (ECCWS), pp. 571–578. ACPI (2018) Tagliaferri, M., Aldini, A.: A taxonomy of computational models for trust computing in decision-making procedures. In: 17th European Conference on Cyber Warfare and Security (ECCWS), pp. 571–578. ACPI (2018)
42.
Zurück zum Zitat Tagliaferri, M., Aldini, A.: A trust logic for pre-trust computations. In: 21th International Conference on Information Fusion (FUSION). IEEE (2018) Tagliaferri, M., Aldini, A.: A trust logic for pre-trust computations. In: 21th International Conference on Information Fusion (FUSION). IEEE (2018)
43.
Zurück zum Zitat Tagliaferri, M., Aldini, A.: A trust logic for the varieties of trust. In: Camara, J., Steffen, M. (eds.) SEFM 2019. LNCS. Springer (2019, to appear) Tagliaferri, M., Aldini, A.: A trust logic for the varieties of trust. In: Camara, J., Steffen, M. (eds.) SEFM 2019. LNCS. Springer (2019, to appear)
44.
Zurück zum Zitat Trivers, R.L.: The evolution of reciprocal altruism. Q. Rev. Biol. 46(1), 35–57 (1971) CrossRef Trivers, R.L.: The evolution of reciprocal altruism. Q. Rev. Biol. 46(1), 35–57 (1971) CrossRef
45.
Zurück zum Zitat Trivers, R.L.: Natural Selection and Social Theory: Selected Papers of Robert Trivers. Oxford University Press, New York (2002) Trivers, R.L.: Natural Selection and Social Theory: Selected Papers of Robert Trivers. Oxford University Press, New York (2002)
47.
Zurück zum Zitat Williamson, O.: Calculativeness, trust, and economic organization. J. Law Econ. 36(2), 453–486 (1993) CrossRef Williamson, O.: Calculativeness, trust, and economic organization. J. Law Econ. 36(2), 453–486 (1993) CrossRef
48.
Zurück zum Zitat Yu, B., Singh, M.P.: Detecting deception in reputation management. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 73–80. ACM (2003) Yu, B., Singh, M.P.: Detecting deception in reputation management. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 73–80. ACM (2003)
Metadaten
Titel
Logics to Reason Formally About Trust Computation and Manipulation
verfasst von
Alessandro Aldini
Mirko Tagliaferri
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39749-4_1

Premium Partner