2011
DOI: 10.1007/978-3-642-22444-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System

Abstract: Abstract. A Trust Management model that provides a measure of the degree to which a principal is trusted for some action is proposed. At the heart of the model is the notion that triangular norms and conorms provide a natural and consistent interpretation for trust aggregation across delegation chains. It is argued that specifying how trust is aggregated is as important as specifying a degree of trust value in an attribute certificate and, therefore, in stating the degree to which a principal trusts another, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Trust evaluation/analysis [8][9][10][11][12][13] and trust aggregation [4,6,8,11,13,14] have been studied in a general setting, as well as for MANETs specifically [14,16,17,18]. Relevant work can be partitioned into centralized approaches, that require every node to share trust information with every other node, and distributed aggregation approaches such as that described in [17].…”
Section: Related Workmentioning
confidence: 99%
“…Trust evaluation/analysis [8][9][10][11][12][13] and trust aggregation [4,6,8,11,13,14] have been studied in a general setting, as well as for MANETs specifically [14,16,17,18]. Relevant work can be partitioned into centralized approaches, that require every node to share trust information with every other node, and distributed aggregation approaches such as that described in [17].…”
Section: Related Workmentioning
confidence: 99%
“…In e.g. [16] algorithms are proposed to quantify the trust relationship between two entities in a network, using transitivity and reachability. For instance, in [15] the authors use an adapted power of the adjacency matrix to evaluate the trust using all existing (finite) trust paths between entities.…”
Section: Monoids Of Trustmentioning
confidence: 99%
“…This check returns a binary answer and we believe that the model could be extended to support forms of quantitative trust, by incorporating KeyNote-style [12] compliance values or weights [11,19] in the delegation statements. We also assume that trust is monotonic, for example, it is safe to rely on a Semantic Threat Graph delegation chain provided by a vendor since the model does not permit other principals to make conflicting assertions about concepts that originated from the vendor's namespace.…”
Section: Related Researchmentioning
confidence: 99%